Spread Spectrum and CDMA: Principles and Applications [1 ed.] 9780470091784, 0470091789

Spread spectrum and code division multiple access (CDMA) have significant applications in radar, navigation, and telecom

596 82 3MB

English Pages 398 Year 2005

Report DMCA / Copyright

DOWNLOAD PDF FILE

Recommend Papers

Spread Spectrum and CDMA: Principles and Applications [1 ed.]
 9780470091784, 0470091789

  • 0 0 0
  • Like this paper and download? You can publish your own PDF file online for free in a few minutes! Sign Up
File loading please wait...
Citation preview

Spread Spectrum and CDMA Principles and Applications

Valery P. Ipatov University of Turku, Finland and St. Petersburg Electrotechnical University ‘LETI’, Russia

Spread Spectrum and CDMA

Spread Spectrum and CDMA Principles and Applications

Valery P. Ipatov University of Turku, Finland and St. Petersburg Electrotechnical University ‘LETI’, Russia

Copyright Ó 2005

John Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex PO19 8SQ, England Telephone (þ44) 1243 779777

Email (for orders and customer service enquiries): [email protected] Visit our Home Page on www.wiley.com All Rights Reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except under the terms of the Copyright, Designs and Patents Act 1988 or under the terms of a licence issued by the Copyright Licensing Agency Ltd, 90 Tottenham Court Road, London W1T 4LP, UK, without the permission in writing of the Publisher. Requests to the Publisher should be addressed to the Permissions Department, John Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex PO19 8SQ, England, or emailed to [email protected], or faxed to (þ44) 1243 770620. Designations used by companies to distinguish their products are often claimed as trademarks. All brand names and product names used in this book are trade names, service marks, trademarks or registered trademarks of their respective owners. The Publisher is not associated with any product or vendor mentioned in this book. This publication is designed to provide accurate and authoritative information in regard to the subject matter covered. It is sold on the understanding that the Publisher is not engaged in rendering professional services. If professional advice or other expert assistance is required, the services of a competent professional should be sought. Other Wiley Editorial Offices John Wiley & Sons Inc., 111 River Street, Hoboken, NJ 07030, USA Jossey-Bass, 989 Market Street, San Francisco, CA 94103-1741, USA Wiley-VCH Verlag GmbH, Boschstr. 12, D-69469 Weinheim, Germany John Wiley & Sons Australia Ltd, 33 Park Road, Milton, Queensland 4064, Australia John Wiley & Sons (Asia) Pte Ltd, 2 Clementi Loop #02-01, Jin Xing Distripark, Singapore 129809 John Wiley & Sons Canada Ltd, 22 Worcester Road, Etobicoke, Ontario, Canada M9W 1L1 Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic books.

British Library Cataloguing in Publication Data A catalogue record for this book is available from the British Library ISBN 0-470-09178-9 (HB) Typeset in 10/12pt Times by Integra Software Services Pvt. Ltd, Pondicherry, India. Printed and bound in Great Britain by Antony Rowe Ltd, Chippenham, Wiltshire. This book is printed on acid-free paper responsibly manufactured from sustainable forestry in which at least two trees are planted for each one used for paper production.

Contents Preface 1 Spread spectrum signals and systems 1.1 Basic definition 1.2 Historical sketch

xi 1 1 5

2 Classical reception problems and signal design 2.1 Gaussian channel, general reception problem and optimal decision rules 2.2 Binary data transmission (deterministic signals) 2.3 M-ary data transmission: deterministic signals 2.4 Complex envelope of a bandpass signal 2.5 M-ary data transmission: noncoherent signals 2.6 Trade-off between orthogonal-coding gain and bandwidth 2.7 Examples of orthogonal signal sets 2.7.1 Time-shift coding 2.7.2 Frequency-shift coding 2.7.3 Spread spectrum orthogonal coding 2.8 Signal parameter estimation 2.8.1 Problem statement and estimation rule 2.8.2 Estimation accuracy 2.9 Amplitude estimation 2.10 Phase estimation 2.11 Autocorrelation function and matched filter response 2.12 Estimation of the bandpass signal time delay 2.12.1 Estimation algorithm 2.12.2 Estimation accuracy 2.13 Estimation of carrier frequency 2.14 Simultaneous estimation of time delay and frequency 2.15 Signal resolution 2.16 Summary Problems Matlab-based problems

7 7 11 17 23 26 28 31 31 33 33 37 37 39 41 43 43 46 46 48 53 55 58 61 62 68

3 Merits of spread spectrum 3.1 Jamming immunity 3.1.1 Narrowband jammer 3.1.2 Barrage jammer

77 77 78 80

vi

Contents

3.2 3.3 3.4 3.5

Low probability of detection Signal structure secrecy Electromagnetic compatibility Propagation effects in wireless systems 3.5.1 Free-space propagation 3.5.2 Shadowing 3.5.3 Multipath fading 3.5.4 Performance analysis 3.6 Diversity 3.6.1 Combining modes 3.6.2 Arranging diversity branches 3.7 Multipath diversity and RAKE receiver Problems Matlab-based problems

82 87 88 89 90 90 91 95 98 98 100 102 106 109

4 Multiuser environment: code division multiple access 4.1 Multiuser systems and the multiple access problem 4.2 Frequency division multiple access 4.3 Time division multiple access 4.4 Synchronous code division multiple access 4.5 Asynchronous CDMA 4.6 Asynchronous CDMA in the cellular networks 4.6.1 The resource reuse problem and cellular systems 4.6.2 Number of users per cell in asynchronous CDMA Problems Matlab-based problems

115 115 117 118 119 121 124 124 125 129 130

5 Discrete spread spectrum signals 5.1 Spread spectrum modulation 5.2 General model and categorization of discrete signals 5.3 Correlation functions of APSK signals 5.4 Calculating correlation functions of code sequences 5.5 Correlation functions of FSK signals 5.6 Processing gain of discrete signals Problems Matlab-based problems

135 135 136 137 139 142 145 145 146

6 Spread spectrum signals for time measurement, synchronization and time-resolution 6.1 Demands on ACF: revisited 6.2 Signals with continuous frequency modulation 6.3 Criterion of good aperiodic ACF of APSK signals 6.4 Optimization of aperiodic PSK signals 6.5 Perfect periodic ACF: minimax binary sequences 6.6 Initial knowledge on finite fields and linear sequences 6.6.1 Definition of a finite field 6.6.2 Linear sequences over finite fields 6.6.3 m-sequences 6.7 Periodic ACF of m-sequences 6.8 More about finite fields

149 149 151 154 155 159 161 161 163 165 167 170

Contents

6.9 Legendre sequences 6.10 Binary codes with good aperiodic ACF: revisited 6.11 Sequences with perfect periodic ACF 6.11.1 Binary non-antipodal sequences 6.11.2 Polyphase codes 6.11.3 Ternary sequences 6.12 Suppression of sidelobes along the delay axis 6.12.1 Sidelobe suppression filter 6.12.2 SNR loss calculation 6.13 FSK signals with optimal aperiodic ACF Problems Matlab-based problems

vii

172 174 176 177 179 181 185 186 187 192 194 196

7 Spread spectrum signature ensembles for CDMA applications 7.1 Data transmission via spread spectrum 7.1.1 Direct sequence spreading: BPSK data modulation and binary signatures 7.1.2 DS spreading: general case 7.1.3 Frequency hopping spreading 7.2 Designing signature ensembles for synchronous DS CDMA 7.2.1 Problem formulation 7.2.2 Optimizing signature sets in minimum distance 7.2.3 Welch-bound sequences 7.3 Approaches to designing signature ensembles for asynchronous DS CDMA 7.4 Time-offset signatures for asynchronous CDMA 7.5 Examples of minimax signature ensembles 7.5.1 Frequency-offset binary m-sequences 7.5.2 Gold sets 7.5.3 Kasami sets and their extensions 7.5.4 Kamaletdinov ensembles Problems Matlab-based problems

203 203

227 232 235 235 236 239 241 243 246

8 DS spread spectrum signal acquisition and tracking 8.1 Acquisition and tracking procedures 8.2 Serial search 8.2.1 Algorithm model 8.2.2 Probability of correct acquisition and average number of steps 8.2.3 Minimizing average acquisition time 8.3 Acquisition acceleration techniques 8.3.1 Problem statement 8.3.2 Sequential cell examining 8.3.3 Serial-parallel search 8.3.4 Rapid acquisition sequences 8.4 Code tracking 8.4.1 Delay estimation by tracking 8.4.2 Early–late DLL discriminators 8.4.3 DLL noise performance Problems Matlab-based problems

251 251 253 253 254 258 261 261 262 263 264 265 265 267 270 273 274

203 207 212 214 214 215 223

viii

9 Channel coding in spread spectrum systems 9.1 Preliminary notes and terminology 9.2 Error-detecting block codes 9.2.1 Binary block codes and detection capability 9.2.2 Linear codes and their polynomial representation 9.2.3 Syndrome calculation and error detection 9.2.4 Choice of generator polynomials for CRC 9.3 Convolutional codes 9.3.1 Convolutional encoder 9.3.2 Trellis diagram, free distance and asymptotic coding gain 9.3.3 The Viterbi decoding algorithm 9.3.4 Applications 9.4 Turbo codes 9.4.1 Turbo encoders 9.4.2 Iterative decoding 9.4.3 Performance 9.4.4 Applications 9.5 Channel interleaving Problems Matlab-based problems

Contents

277 277 279 279 281 284 285 286 286 289 292 296 296 296 299 300 301 302 302 304

10 Some advancements in spread spectrum systems development 10.1 Multiuser reception and suppressing MAI 10.1.1 Optimal (ML) multiuser rule for synchronous CDMA 10.1.2 Decorrelating algorithm 10.1.3 Minimum mean-square error detection 10.1.4 Blind MMSE detector 10.1.5 Interference cancellation 10.1.6 Asynchronous multiuser detectors 10.2 Multicarrier modulation and OFDM 10.2.1 Multicarrier DS CDMA 10.2.2 Conventional MC transmission and OFDM 10.2.3 Multicarrier CDMA 10.2.4 Applications 10.3 Transmit diversity and space–time coding in CDMA systems 10.3.1 Transmit diversity and the space–time coding problem 10.3.2 Efficiency of transmit diversity 10.3.3 Time-switched space–time code 10.3.4 Alamouti space–time code 10.3.5 Transmit diversity in spread spectrum applications Problems Matlab-based problems

307 307 307 309 311 314 315 316 316 317 318 322 325 326 326 327 329 331 333 334 336

11 Examples of operational wireless spread spectrum systems 11.1 Preliminary remarks 11.2 Global positioning system 11.2.1 General system principles and architecture 11.2.2 GPS ranging signals 11.2.3 Signal processing

339 339 339 340 341 343

Contents

11.2.4 Accuracy 11.2.5 GLONASS and GNSS 11.2.6 Applications 11.3 Air interfaces cdmaOne (IS-95) and cdma2000 11.3.1 Introductory remarks 11.3.2 Spreading codes of IS-95 11.3.3 Forward link channels of IS-95 11.3.3.1 Pilot channel 11.3.3.2 Synchronization channel 11.3.3.3 Paging channels 11.3.3.4 Traffic channels 11.3.3.5 Forward link modulation 11.3.3.6 MS processing of forward link signal 11.3.4 Reverse link of IS-95 11.3.4.1 Reverse link traffic channel 11.3.4.2 Access channel 11.3.4.3 Reverse link modulation 11.3.5 Evolution of air interface cdmaOne to cdma2000 11.4 Air interface UMTS 11.4.1 Preliminaries 11.4.2 Types of UMTS channels 11.4.3 Dedicated physical uplink channels 11.4.4 Common physical uplink channels 11.4.5 Uplink channelization codes 11.4.6 Uplink scrambling 11.4.7 Mapping downlink transport channels to physical channels 11.4.8 Downlink physical channels format 11.4.9 Downlink channelization codes 11.4.10 Downlink scrambling codes 11.4.11 Synchronization channel 11.4.11.1 General structure 11.4.11.2 Primary synchronization code 11.4.11.3 Secondary synchronization code

ix

344 344 345 345 345 346 347 347 347 348 349 351 352 353 353 355 355 356 357 357 358 359 360 361 362 363 364 365 365 366 366 366 367

References

369

Index

375

Preface Spread spectrum and CDMA (code division multiple access) are up-to-date technologies widely used in operational radar, navigation and telecommunication systems and playing a dominant role in the philosophy of the forthcoming generations of systems and networks. The amount of interest and effort invested in this encouraging area by research institutions and industry is gigantic and constantly growing, especially after the prominent commercial success of CDMA mobile telephone IS-95 and the use of CDMA as the basic platform of 3G (and beyond) mobile radio. No wonder that the fundamentals of spread spectrum theory have assumed a solid place in the basic university disciplines, while the detailed issues form the contents of numerous advanced courses. This book was conceived as a textbook for postgraduate and undergraduate students, and is also expected to be useful in training industry personnel and in the daily work of researchers. It is based on the experience and knowledge gained by the author during more than three decades of research activity in the area, as well as on his lecture courses. The original version of such a course started in the late 1970s at the Saint Petersburg Electrotechnical University ‘LETI’ and has since been continually developed and modernized, absorbing many state-of-the-art achievements and being presented to audiences from Russia, the UK, Australia, China, Finland and other countries. The intention of the author in preparing this book was to present the key ideas of spread spectrum in the most general form equally applicable to both systems of collecting and recovering information (such as radar and navigation) and telecommunication systems or networks. The author’s second concern was to link the material as tightly as possible to classical signal and communication theory, which gives Chapter 2 a special role. The goal pursued everywhere was harmony between mathematical rigour and physical transparency of some or other issue under discussion and the reader’s deep understanding of the reasons underlying the preference for spread spectrum and CDMA. The main question the author tried to answer in considering this or that problem was ‘Why?’—i.e. why a designer may or should prefer one solution over others. A particular emphasis of the book is designing spread spectrum signals. Many popular books, although deservedly reputable, do not go into this problem beyond presenting a brief survey of m-sequences and Gold codes. A reader may thereby get a false idea that nothing valuable exists outside this narrow range of attractive signal families. In Chapters 6 and 7 we try to show that the designer’s freedom and the

xii

Preface

multitude of alternatives are much broader and comprise many solutions potentially competitive or clearly superior to those mentioned above. In no way is this book intended to be looked upon as a manual introducing concrete operational or projected systems and standards. However, some such systems give a rich soil to illustrate the theory and for this reason are frequently mentioned in the text as examples of practical realization of spread spectrum principles. Another aid for better adoption of the contents is offered by the problems at the end of every theoretical chapter. Especially recommended are the Matlab-based problems, since their running involves and develops investigatory skills and allows execution of an extensive experimental study. The book is supported by the companion website on which instructors and lecturers can find a solutions manual for the problems and matlab programming within the book, electronic versions of some of the figures and other useful resources such as a list of abbreviations etc. Please go to ftp://ftp.wiley.co.uk/pub/books/ipatov. If you have any comments regarding the book please feel free to contact the author directly at [email protected]. The author is sceptical enough to realize that no book—including this one—can be totally free of shortcomings. In our case the difficulties were greatly intensified by the necessity of writing in a non-mother tongue. Nevertheless, the author is entirely responsible for all of the statements as well as the drawbacks of the book and is ready to accept any constructive remarks or criticism. I would like to express my sincere gratitude to the Department of Information Technology of the University of Turku for the friendly and creative atmosphere during my work in Finland. I address my special appreciation to Professor Jouni Isoaho and Dr Esa Tjukanoff for their daily support and cooperation. Many thanks to my colleagues Dr Nastooh Avessta and Dr Igor Samoilov, who kindly and carefully read the manuscript and, by way of innumerable discussions, helped in my endeavour to streamline it. The assistance of Jarkko Paavola and Alexey Dudkov in rectifying and debugging the manuscript can hardly be overestimated, too. This is a good opportunity to emphasize my deepest gratitude to my dear teachers Professor Yu. A. Kolomensky, Professor Yu. M. Kazarinov and Professor Yu. D. Ulianitsky, who introduced me to the fascinating world of signals and noise, and were for decades my advisors in many professional as well as personal matters. Warmest thanks to all my colleagues at the Department of Radio Systems of Saint Petersburg State Electrotechnical University ‘LETI’ for a long-standing collaboration. I bring my gratitude also to Sarah Hinton and her colleagues at John Wiley & Sons, Ltd for initiating this project and inspiring me in the course of writing, and my special thanks to the Nokia Foundation for the grant awarded to me at the final stage of preparing the manuscript. And finally I cannot help mentioning my wife’s patience and care during the year of my working on this book. Valery P. Ipatov

1 Spread spectrum signals and systems 1.1 Basic definition The term spread spectrum is today one of the most popular in the radio engineering and communication community. At the same time, it may appear difficult to formulate an unequivocal and precise definition distinctively separating the spread spectrum philosophy from a ‘non-spread spectrum’ one. Certainly, every expert in system design and every experienced researcher has an intuitive understanding of the core of the issue, but—unlike a newcomer—such a person does not need to think about definitions in order to respond successfully to his or her professional challenges. From the point of view of the target audience of the book it seems worthwhile to dedicate some space to elaborating an appropriate explanation of what is implied in the following text under the spread spectrum concept. Let us start with a reminder of the basics of spectral analysis. Every signal s(t) of finite energy can be synthesized as a sum of an uncountable number of harmonics whose amplitudes and phases within the infinitesimal frequency range [f , f þ df ] are determined by a spectral density or spectrum s~(f ). It is the pair of inverse and direct Fourier transforms that expresses this fact mathematically: sðtÞ ¼

Z1 1

~ sðf Þ expðj2ftÞ df

s~ðf Þ ¼

Z1 1

sðtÞ expð j2ftÞ dt

ð1:1Þ

Due to the one-to-one correspondence between the signal representation in the time domain s(t) and in the frequency domain s~(f ), we are able to switch arbitrarily between these two tools, selecting the more convenient one for any specific task. To characterize the size of the zones occupied by signal energy in the time and frequency domains we use the notions of signal duration T and bandwidth W, respectively. A signal whose energy

Spread Spectrum and CDMA: Principles and Applications Ó 2005 John Wiley & Sons, Ltd

Valery P. Ipatov

2

Spread Spectrum and CDMA

is concentrated within strictly limited space in the time domain cannot have finite (i.e. non-zero in only limited frequency interval) spectrum and vice versa. Because of this, to define at least one of the parameters T, W, or both, some agreement is necessary about what is meant by duration or bandwidth. In this way effective, root mean square, etc. duration and bandwidth came into existence, showing the size of a zone spanned by a substantial part of signal energy in the time and frequency domains, respectively [1]. It is absolutely obvious that one way or another, the word ‘spread’ is indicative of wide spectrum, i.e. broad bandwidth W of a signal. But against what is the spectrum wide? Where is the reference for comparison? To demonstrate how a definition of spread spectrum may provoke debate, let us consult with several excellent and world-renowned books. A rather frequent way to explain the concept consists in the statement that a system or a signal is of spread spectrum type if its bandwidth significantly exceeds the minimum bandwidth necessary to send the information [1–6]. What may seem mentally problematic in this definition is the very idea of minimum bandwidth of information or message. According to the fundamental Shannon’s bound, spectral efficiency (the ratio between the data rate R and the signal bandwidth W ) of a communication system operating over the Gaussian channel obeys the inequality:   R R Eb R Eb 2W 1 < log2 1 þ > R or N0 W N0 W W

ð1:2Þ

where Eb is signal energy per bit of information and N0 is the one-side power spectral density of a Gaussian noise. Figure 1.1 represents bound (1.2) graphically, showing that any combinations of R/W and Eb /N0 falling below the curve are possible, at least in principle. But this means that the theoretical ‘minimum bandwidth necessary to send the information’ is zero and therefore any real system—which, of course, occupies some

102 Forbidden area Allowed area 101 R/W 100

10–1

0

50

100

150 Eb/N0 dB

200

Figure 1.1 Shannon’s bound

250

300

Spread spectrum signals and systems

3

non-zero bandwidth—should be treated as a spread spectrum one! Undeniably, any attempt to use near-zero data transmission bandwidth would be rather demanding for signal energy. For one thing, to operate with R ¼ 100W one would need to provide bit signal-to-noise ratio Eb /N0 around 280 dB, which is quite unrealistic. However, data transmission within bandwidth, for instance, up to ten times smaller than data rate is quite typical and is practised in many digital communication links (radio-relay lines, modem communications etc.). This shows the vagueness of the very idea of the ‘minimal bandwidth’ and the arguable character of taking it as a starting point for explaining the notion of spread spectrum. As an attempt to eliminate ambiguity we can try to use rate of data in bits per second as a substitute for the above-mentioned minimal necessary bandwidth [7,8]. It is not very logical, however, that one of many possible and, in principle, equal in rights units of measurement of data rate is rendered some conceptually prominent role. Besides, defining spread spectrum in terms of bandwidth significantly exceeding data rate in bits per second is risky of comprising systems which are in no way of spread-spectrum type. Take, for example, the uplink between a single user and a base station in a GSM mobile telephone. With the rate of primary digitized speech data of 9.6 kbits/s, the user’s signal has bandwidth around 200 kHz, which may mislead someone to classify GSM as a spread spectrum system. However, no genuine features of spread spectrum are involved in the band broadening in the GSM uplink: the only reason why bandwidth exceeds the data rate is time-division multiple access (TDMA) forcing operation with much shorter transmitted symbols in comparison with the actual average time interval per information bit. There is still one more reason to look for alternative definitions. Even ignoring the troubles discussed earlier, linking a definition to data rate or ‘message bandwidth’ can serve only data transmission systems, whereas spread spectrum is widely employed in many others, like radar, sonar, navigation or remote control for time and distance measuring, signal resolution etc. Actually, these systems were among the first to adopt the advantages of the technology under discussion. In those applications such categories as ‘information rate’ or ‘data bandwidth’ are hardly meaningful or, at least, have nothing to do with the aims of spreading spectrum. In the wake of the endeavour to define ideas of spread spectrum in some universal way, matching not only communication aspects but the needs of other application areas as well, the following definition of spread spectrum seems more relevant. Let us turn to the Gabor uncertainty principle, according to which the product of signal duration and bandwidth (time–frequency product) satisfies inequality WT  a, where constant a depends on the exact way in which duration and bandwidth are specified; however, it is always of the order of 1. A signal for which WT  1, and therefore duration and bandwidth are tightly linked to each other can be called plain (non-spread spectrum). The only way to widen the bandwidth of a plain signal is to reduce its duration, i.e. to shorten it. On the other hand, a deterministic signal for which WT  1 and bandwidth can be governed independently of duration is a spread spectrum one. Putting it in other words, we may say that any spread spectrum signal occupies a rectangle in the time–frequency plane whose square is much greater than 1. This definition automatically defines a spread spectrum system, too: a system employing spread spectrum signals is a spread spectrum system.

4

Spread Spectrum and CDMA

Note that in this definition the independence of duration and bandwidth is particularly emphasized, meaning that one can broaden the bandwidth (duration) without shortening the signal in time (frequency). This has a further implication for the critical role of angle (phase or frequency) modulation in all spread spectrum technology. Indeed, how can amplitude modulation help in widening the spectrum? The answer is: only by reducing the area over which signal energy is effectively spread in the time domain, i.e. by actually reducing the effective signal duration. It is only angle modulation that is capable of widening the signal spectrum with no influence on the time-distribution of signal energy. As an illustration, Figure 1.2 gives the example of two rectangular pulses having the same duration T and carrier frequency f0 : (a) a signal with no internal modulation and (b) a linearly frequency-modulated (LFM) signal with deviation Wd ¼ 20/T. The lower curves show the spectra of these signals. As is seen for signal (a), bandwidth W has the order W  1/T, meaning that the signal energy spans in the frequency domain an interval approximately equal to inverse pulse duration. Thereby, duration and bandwidth are strictly tied, the time–frequency product is fixed and widening the spectrum can be achieved only in exchange for pulse shortening. At the same time the bandwidth of pulse (b) is close to frequency deviation (W  Wd ) and much greater than the inverse duration. As a result bandwidth can be easily controlled independently of signal duration by just varying the deviation. Accordingly, we classify the first signal as plain and the second as of spread spectrum type.

1.0

1.0

0.5

0.5

s(t) 0.0

s(t) 0.0

–0.5

–0.5

–1.0 0

–1.0 0.2

0.4

0.6

0.8

1.0

1.2

1.4

0

0.2

0.4

~ s( f )

1000

1000

800

800

600

~ s( f )

400

200

200 10

20

0.8

1.0

1.2

1.4

600

400

0 0

0.6 t

t

30

40

0 0

10

20

fT

fT

(a)

(b)

30

40

Figure 1.2 Unmodulated (a) and frequency modulated (b) rectangular pulses and their spectra

Spread spectrum signals and systems

5

The definition given is in fact the one which has been widely and long since adopted in the systems of radar-akin philosophy, but it is also consistent with data communication problems. That is why we will rely on it in the following text.

1.2 Historical sketch The history of spread spectrum covers over six decades and may serve as a topic of separate study. The reader interested in learning the chronology of the key events can address in-depth (albeit focused almost totally on US developments) surveys in [9,10]. Here we limit ourselves to only a very brief mention of the main historical landmarks. Probably the first patent on the radar, which in modern terminology may be without doubt treated as spread spectrum, was obtained by G. Guanella in 1938. During and after World War II, intensive research in radar spread spectrum systems had been undertaken in Germany, the USA, the UK and the USSR. In parallel with technological and technical advancements, numerous solid theoretical investigations had been conducted into the precision and signal resolution of radar. The most influential and deep results in this regard were published by P. M. Woodward in his 1953 book. It should be noted in passing that many of these results were explainable based on fundamental works by C. Shannon and V. A. Kotelnikov between 1946 and 1948, the role of which thereby goes far beyond only ‘pure’ data communication applications. Certainly, for a long time a great deal of information on new practical developments in spread spectrum radar and navigation was classified, because military and intelligence services supervised the great majority of projects. However, many ideas were getting widely known as soon as they were realized in systems of mass-scale usage. A good example of this is the world-wide navigation system Loran-C deployed in the early 1960s in which ground-based longwave radio beacons transmitted ‘genuine’ spread spectrum (PSK) signals having time–frequency product WT ¼ 16. To imagine how viable this system appeared to be, it is enough to stress that with continual modernization and numerous improvements it has managed to remain in operation to see the third millennium. Another giant step in the practical implementation of the spread spectrum concept in time–distance measuring systems was taken with the creation of the 2G space-based global navigation networks GPS (USA) and GLONASS (USSR/Russia) in the 1980s and early 1990s. Signals with very large time–frequency products, measured in the thousands, are at the heart of these systems, which today constitute an integral part of human civilization as satellite television and mobile radio. The earliest works in spread spectrum applications to data transmission were primarily aimed at speech masking and communication protection. They started again before World War II in Germany and were soon taken up in the USA, the USSR and elsewhere. An intriguing action of the novel The First Circle by Alexander Solzhenitsyn unfolds in the special Soviet jail where convicted scholars and engineers are collected together to elaborate the noise-masked speech transmission system. Among the turning points in spread spectrum communication, the RAKE algorithm proposed by R. Price and P. Green (1957) should be pointed to, which marked the beginning of the direction later called multipath diversity. Works in the 1960s by

6

Spread Spectrum and CDMA

S. Golomb, N. Zierler, R. Gold, T. Kasami and others in the field of discrete sequences with special correlation properties played a crucial role in the formation of spread spectrum technology and numerous practical achievements. The commercial spread spectrum era started around the late 1970s, at the time when the mobile telephone began its triumphant conquest of the world. The first proposals for CDMA cellular networks in the USA and Europe (1978–1980) yielded to alternative projects, which later evolved into the GSM and DAMPS standards. However, in the mid 1990s the 2G standard IS-95 was put forward, resting on a fully spread spectrum/ CDMA platform. At a cosmic pace, networks of this standard (later named cdmaOne) gained wide recognition in America, Asia and the former Soviet Union countries. The great success of IS-95, as well as careful analysis and further experiments, had led to acceptance of the spread spectrum/CDMA philosophy as the basic platform for the major 3G mobile radio specifications: UMTS and cdma2000. Both of them are now in the pre-operational stage and undoubtedly will become the main mobile communication instruments for the next decades. To conclude this introductory chapter, there are a few words about the development of spread spectrum technology in the Soviet Union and later in Russia. Surveys published in the West usually report only a little on Soviet research in this area. There are a number of objective reasons for this, characteristic of the cold war period: the country’s self-isolation, strict limits on the contacts of Soviet specialists with their foreign colleagues and publications abroad, excessive and often needless secrecy etc. The language barrier has also been a serious impediment. But as a matter of fact, Soviet advancement in the spread spectrum field between the 1950s and the 1990s was very up-to-date and quite competitive with developments in the USA and Europe. Works by D. E. Vackman, Ya. D. Shirman, M. B. Sverdlick (spread spectrum radar signal design and processing), I. N. Amiantov and L. E. Varakin (spread spectrum communications) were pioneering in many respects and recruited generations of young professionals into this attractive and absorbing research area.

2 Classical reception problems and signal design It is typical of communication theory to start analysing a system from the receiving end. The aim is usually to design an optimal receiver, which retrieves the information contained in the observed waveform with the best possible quality. Knowing optimal reception processing algorithms depending on a specific transmitted signal structure, it is possible afterwards to design an optimal transmitted signal, i.e. to choose the best means of encoding and modulation. In this chapter we investigate how classical reception problems appeal to the spread spectrum, or, in other words, which of the classical reception problems demand (or not) the involvement of spread spectrum signals. We call reception problems ‘classical’ if they are based on the traditional Gaussian channel model.

2.1 Gaussian channel, general reception problem and optimal decision rules The following abstract model can describe any information system in which data is transmitted from one point in space to another. There is some source that can generate one of M possible messages. This source may be governed or at least created by some human being, but it may also have a human-independent nature. In any case, each of the M competitive messages is carried by a specific signal so that there is a set S of M possible signals: S ¼ fsk (t): k ¼ 1, 2, . . . , Mg. There is no limitation in principle on the cardinality of S, i.e. the number of signals M, and, if necessary, the set S may even be assumed uncountable. The source selects some specific signal sk (t) 2 S and applies it to the channel input (see Figure 2.1). At the receiving side (channel output) the observation waveform y(t) is received, which is not an accurate copy of the sent signal sk (t) but, instead, is the result of sk (t) being corrupted by noise and interference intrinsic to any real channel. For the receiver there are M competitive hypotheses Hk on which one of M possible signals was actually transmitted and turned by the channel into this specific observation y(t), and only one of these hypotheses should be chosen as true. Denote the

Spread Spectrum and CDMA: Principles and Applications Ó 2005 John Wiley & Sons, Ltd

Valery P. Ipatov

8

Spread Spectrum and CDMA

sk(t)

Figure 2.1

y(t) Channel

General system model

^j , read as ‘the decision is made in favour of result of this choice, i.e. the decision, as H signal number j’. With this the classical reception problem emerges: what is the best strategy to decide which one of the possible messages (or signals) was sent, based on the observation y(t)? To answer this question it is necessary to know the channel model. The channel is mathematically described by its transition probability p[y(t)js(t)], which shows how probable it is for the given input signal to be transformed by the channel into one or another output observation y(t). When the transition probability p[y(t)js(t)] is known for all possible pairs s(t) and y(t), the channel is characterized exhaustively. When all source messages are equiprobable (which is typically the case in a properly designed system) the optimum observer’s strategy, securing minimum risk of mistaking an actually sent signal for some other, is the maximum likelihood (ML) rule. According to this rule, after the waveform y(t) is observed the decision should be made in favour of the signal which has the greatest (as compared to the rest of the signals) probability of being transformed by the channel into this very observation y(t). The primary channel model in communication theory is the additive white Gaussian noise (AWGN) or, more simply, the Gaussian channel in which the transition probability drops exponentially with the growth of the squared Euclidean distance between a sent signal and output observation:   1 2 p½yðtÞjsðtފ ¼ k exp d ðs; yÞ ð2:1Þ N0 where k is a constant independent of s(t) and y(t), N0 is white noise one-side power spectral density, and the Euclidean distance from s(t) to y(t) is defined as: vffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi uZT u u dðs; yÞ ¼ t ½yðtÞ sðtފ2 dt ð2:2Þ 0

Explanation of the particular importance of the Gaussian model lies in the physical origin of many real noises. According to the central limit theorem of probability theory, the probability distribution of a sum of a great number of elementary random components, which are neither strongly dependent on each other nor prevailing over the others, approaches the Gaussian law whenever the number of addends goes to infinity. But thermal noise and many other types of noise, typical of real channels, are produced precisely as the result of summation of a great many elementary random currents or voltages caused by chaotic motion of charged particles (electrons, ions etc.). When talking about the distance between signals or waveforms, we interpret them as vectors, which is universally accepted in all information-related disciplines. If the reader finds it difficult to imagine the association between signals and vectors, a very

9

Classical reception problems and signal design

simple mental trick may be a useful aid. Imagine discretization of a continuous signal in time, i.e. representing s(t) by samples si ¼ s(iTs ), i ¼ 0, 1, . . ., taken with a sampling period Ts . If the total signal energy is concentrated within the bandwidth W and Ts  1/2W (ignoring that theoretically no signal is finite in both the time and the frequency domains), samples si represent exhaustively the original continuous-time signal s(t). With signal duration T there are n ¼ T/Ts such samples altogether, and therefore the n-dimensional vector s ¼ (s0 , s1 , . . . , sn 1 ) describes the signal entirely. Having done the same with observation y(t), we come to its n-dimensional vector equivalent y ¼ (y0 , y1 , . . . , yn 1 ) and find the Euclidean distance between vectors s and y by Pythagorean theorem for the n-dimensional vector space: vffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi un 1 uX dðs; yÞ ¼ t ðyi si Þ2 i¼0

One possible way of finishing the game is letting Ts go to zero. Then vectors s, y, remaining signal and observation equivalents, become of infinite dimension (actually repeat s(t), y(t) since there is no longer any discretization in the limit). At the same time, the sum above (ignoring the cofactor) turns into the integral in the right-hand side of equality (2.2). The latter, thereby, is the definition of Euclidean distance for continuous time waveforms. Now come back to the ML rule for the Gaussian channel. According to equations (2.1) and (2.2), signal likelihood (the probability of being transformed by the channel into the observed y(t)) falls with Euclidean distance between s(t) and y(t). Therefore, the ML decision in the Gaussian channel can be restated as the minimum distance rule: ^j is taken dðsj ; yÞ ¼ min dðsk ; yÞ ) H k

ð2:3Þ

i.e. the decision is made in favour of signal sj (t) if it is closest (in terms of Euclidean distance) to observation y(t) among all M competitive signals (Figure 2.2). Another, more direct, notation of (2.3) is: ^s ¼ arg min dðs; yÞ s2S

where ^s is an estimation of the received signal (i.e. the signal declared received).

s1

s2

sj sM

Figure 2.2

y

d(sj, y) = min d(sk, y) k

Illustration of minimum distance rule

10

Spread Spectrum and CDMA

Continuing the geometrical interpretation of signals, we can introduce signal geometric length (norm) pffiffiffiffi ksk as its distance from the origin. Then from (2.2) it follows that ksk ¼ d(s, 0) ¼ E , where: E¼

ZT

s2 ðtÞdt

ð2:4Þ

0

is signal energy. Another important geometrical characteristic is the inner (scalar) product (u, v) of two signals u(t), v(t): ðu; vÞ ¼

ZT

uðtÞvðtÞdt

ð2:5Þ

0

which again can be thought of as a limit form of an inner product of two n-dimensional vectors. The same entity may also be calculated through the lengths of the vectors and the cosine of the angle  between them: (u, v) ¼ kukkvk cos , and thus the inner product describes the closeness or resemblance between signals, since the closer the signals are to each other, with lengths (energies) fixed, the closer to one is cos  and the greater is the inner product. Because of this the inner product is also called the correlation of signals. In order to outline the special role of this entity, let us now give a slightly different version of the minimum distance rule. Opening the brackets in (2.2) leads to: d 2 ðsk ; yÞ ¼

ZT 0

y2 ðtÞ dt

2

ZT

yðtÞsk ðtÞ dt þ

ZT

s2k ðtÞ dt ¼ kyk2 2zk þ ksk k2

ð2:6Þ

0

0

where zk stands for correlation of observation y(t) with kth signal sk (t): zk ¼ ðy; sk Þ ¼

ZT

yðtÞsk ðtÞ dt

ð2:7Þ

0

The first summand in the right-hand side of equation (2.6) is fixed for a given observation, and therefore does not affect comparing distances and the decision on which signal is received. The last term is just the kth signal energy Ek . With this in mind, distance rule (2.3) can be reformulated as the following correlation decision rule:   Ej Ek ^j is taken ¼ max zk ð2:8Þ zj )H k 2 2 meaning, in particular, that it is maximally correlated with observation y(t) signal, which is announced as having actually been received among all M competitive signals of equal energies. The last case is very well explainable physically: preference is simply given to the signal which has stronger resemblance to y(t) than all the rest, correlation (inner product) being accepted as a criterion of resemblance.

11

Classical reception problems and signal design

n

s1 y

sM

s2 sk

Figure 2.3

Observation scattering and signal design problem

It is interesting to note in passing that these deliberations, although very preliminary, already give a rather clear idea of good signal set design. Look at Figure 2.3, where the signal vectors are depicted. Suppose signal s1 is transmitted and corrupted by the AWGN channel, which adds to s1 noise vector n. A Gaussian vector n has symmetrical (spherical) probability distribution dropping exponentially with the length of the vector n, which is readily seen from (2.1) after removing the signal from it (substituting s(t) ¼ 0). Hence, observation vector y ¼ s1 þ n proves to be scattered around s1 , as is shown by the figure, and, according to the minimum distance rule (2.3), as soon as y comes closer to some other signal than to s1 a wrong decision will happen. To minimize the risk of such an error we should have all the other signals as distant from s1 as possible. Because any one of M signals may be transmitted equiprobably, i.e. be in place of s1 , it is clear that all distances d(sk , sl ), 1  k < l  M should be as large as possible. When M is large enough it is not a simple task to maximize all the distances simultaneously, since they can conflict with each other: moving one vector from another may make the first closer to a third one. Due to this, the problem of designing a maximally distant signal set (entering a wide class of so-called packing problems) is in many cases rather complicated and has found no general solution so far. Note that in what preceded all M signals were by default treated as fully deterministic, i.e. all their parameters are assumed to be known a priori at the receiving end, the observer being unaware only of which of the competitive M signals is received. This model is adequate to many situations in baseband or coherent bandpass signal reception. However, the general thread, with some adjustments, also retains its validity in more complicated scenarios, such as noncoherent reception (Section 2.5). Having refreshed these basic ideas of optimal reception, we are now ready to get down to specific problems, putting particular emphasis on aspects of signal design and analysing the potential advantages of spread spectrum—or their absence—in various classical reception scenarios.

2.2 Binary data transmission (deterministic signals) To demonstrate the strong dependence of reception quality on the distances between signals, let us start with the simplest but very typical communication problem of binary data transmission, where one of only M ¼ 2 competitive messages is sent over the channel. Practically, this may correspond to the transmission of one data bit in a system

12

Spread Spectrum and CDMA

where no channel coding is used, or one symbol of binary code in a system with errorcorrecting code and hard decisions, etc. Numbering the messages 0 and 1 and assuming that signals s0 (t) and s1 (t) (again deterministic!) are used for their transmission, we can represent the minimum distance decision rule (2.3) as: ^0 H

dðs0 ; yÞ < dðs1 ; yÞ >

ð2:9Þ

^1 H

where placement of the decision symbols points directly to when one or the other of two decisions is made. The same can be rewritten in correlation-based form following from rule (2.8): z ¼ z0

^0 H

z1 >
106 orthogonal signals. This will lead to spectral efficiency less than 2  10 5 or bandwidth occupied wider than 480 MHz, which looks wholly impractical versus the data rate 9.6 kbps.

The discussion undertaken illustrates the very tough character of the trade-off between energy efficiency and spectral efficiency inherent in orthogonal signalling. At the same time it is pertinent to note that, although big energy gains are unattainable in practice with orthogonal signals due to the enormous demand for bandwidth, asymptotic orthogonal coding gain may serve as a good reference point, being the upper border of theoretical efficiency of any m-bit-block coding. Return now to equation M ¼ Wt Tt and consider the question: when the number of orthogonal signals and thus the product Wt Tt is measured in the tens or more, does it point to a spread spectrum? In other words, is a system exploiting numerous orthogonal signals always a spread spectrum one? As the discussion in the next section shows, the answer to this question is in general negative.

2.7 Examples of orthogonal signal sets Throughout this section we will again ignore the opportunity of doubling the number of orthogonal signals by quadrature carrier shifts, which is always present in a coherent bandpass system, and concentrate only on the dependence between M and equivalent baseband system time–frequency resource Wt Tt . We will demonstrate first how to build the simplest orthogonal sets based on fragmentation of an available resource.

2.7.1 Time-shift coding It is obvious that the inner product of any two non-overlapping time-shifted signals is zero. Consider M signals shown in Figure 2.10a, which occupy jointly time period Tt . With signal duration no greater than T ¼ Tt /M and the time shift between successive signals no smaller than the signal duration, this time-shift coding produces orthogonal signals. The estimated bandwidth W of each of these signals is inverse to its duration and all the signals are permitted to occupy the same bandwidth with no violation of orthogonality: W ¼ Wt . Hence, the maximal number of orthogonal signals of this sort which can be accommodated within a given total time–frequency resource Tt , Wt is M ¼ Tt /T ¼ Wt Tt , i.e. as is easily foreseen, it is equal to the signal space dimension ns ¼ Wt Tt . A high necessary number of signals M  1 implies a large product Wt Tt ¼ M, which may seem to point to spread spectrum. However, for any individual signal the time–frequency product is WT ¼ Wt T ¼ Wt Tt /M ¼ 1, so that the signals are not of spread spectrum type. In the

32

Spread Spectrum and CDMA

|s~1( f )|

s1(t) t T

f

W

s2(t)

|s~2( f )|

t

Tt = MT

f

Wt = MW

sM (t)

|s~M( f )|

t

f

(a) Figure 2.10

(b)

Orthogonal time-shift coded (a) and frequency-shift coded (b) signals

wake of the agreement to call a system ‘spread spectrum’ only if it uses spread spectrum signals (see Section 1.1), orthogonal time-shift coding has nothing to do with spread spectrum. Let the total time–frequency resource be identified with a rectangle having sides Tt , Wt in the t, f coordinate plane. Then time-shift coding just means slicing this resource into M vertical strips, each being assigned to some individual signal (see Figure 2.11a). Orthogonality in this transmission mode is provided by a rigorous distribution of the time resource between signals, each exploiting the total spectral resource. The orthogonal signalling scheme just introduced may seem attractive from an implementation point of view due to its apparent simplicity. Its weaknesses, however, are also conspicuous and should be kept in focus. First, accurate synchronization is necessary, any potential fluctuations of signal time positions being capable of destroying orthogonality. This requires secure safety margins between signals, which reduces the number of signals compared to the theoretical maximum, i.e. worsens spectral efficiency. Another issue is the

Wt = W

Wt

M

W = Wt /M 1

2

k

M

k

2 1 Tt = T

Tt T = Tt /M

(a)

(b)

Figure 2.11 Resource distribution in orthogonal time-shift (a) and frequency-shift (b) coding

33

Classical reception problems and signal design

value of the peak-factor , which is the ratio between peak and average powers. Because an individual signal occupies only an Mth part of the available time resource, average power is M times smaller than peak power and ¼ M  1. At the same time, in designing a transmitter power amplifier, a small value of is crucial: the closer it is to 1, the softer are the demands on the linearity of an amplifier and the better is its power performance.

2.7.2 Frequency-shift coding The other straightforward way to provide orthogonality is frequency-shift coding. Due to time–frequency duality or Parseval theorem, the inner products of signals u(t), v(t) and of their spectra u~(f ), v~(f ) coincide:

ðu; vÞ ¼

Z1 1

uðtÞvðtÞ dt ¼

Z1 1

u~ðf Þ~ v ðf Þdf ¼ ð~u; ~vÞ

ð2:49Þ

which allows transfer of the idea discussed above into the frequency domain (see Figure 2.10b). With an entire overlap of the signals in time (T ¼ Tt ) each of them has bandwidth W ¼ 1/Tt at the least. Thus the maximum number of orthogonal signals formed by shifting the spectra is again M ¼ Wt /W ¼ Wt Tt ¼ ns . As in the previous case, the total resource is again ‘sliced’, but differently: the strips are horizontal, meaning that the total time resource Tt but only an Mth part of the entire frequency resource Wt are utilized by every signal (Figure 2.11b). Clearly, each individual signal is again non-spread-spectrum since its time–frequency product WT ¼ (Wt /M)Tt ¼ 1, and any system with however large a number of orthogonal signals of this sort is certainly not a spread spectrum one. The peak-factor of this mode of orthogonal signalling, unlike time-shift coding, is ¼ 1 and synchronization errors are not that dramatic because orthogonality is provided by signal non-overlap in the frequency domain. Instead, spectra drifts (e.g. because of Doppler shifts) may sometimes be destructive. Still, this transmission mode is extremely popular and the conventional M-ary FSK modulation is its direct embodiment. The examples considered explain why employing even a great number of orthogonal signals and, hence, the necessity for a total resource Wt Tt  1 does not automatically mean the involvement of spread spectrum technology.

2.7.3 Spread spectrum orthogonal coding Fragmentation of the total time–frequency resource inherent to the two discussed modes of orthogonal signalling may in some cases be a preferable solution in connection with hardware implementation aspects. However, with M increasing reasons of this sort are getting more doubtful since, as mentioned above, time-shift coding demands a high peak-factor while frequency-shift coding implies optimal processing with a bank of numerous parallel frequency-detuned filters. Under such circumstances spread spectrum orthogonal signalling can prove very competitive, allowing all signals to share a total time–frequency resource with no distribution or slicing of the latter. Consider a simple example of realization of the idea

34

Spread Spectrum and CDMA

in the form of discrete BPSK signals. Compose each of M signals of N consecutive contiguous elementary pulses or chips, each having the same rectangular shape and duration D. Let the chip polarities of the signal number k be manipulated by a code sequence (or simply code) of binary symbols ak, i ¼ 1, where k ¼ 1, 2, . . . , M and the second subscript is chip number (discrete time): i ¼ 0, 1, . . . , N 1. Then the baseband version of such a signal may be written as: sk ðtÞ ¼

N X1 i¼0

ak;i s0 ðt

ð2:50Þ

iDÞ

with s0 (t) symbolizing the rectangular chip of duration D. Calculate now the inner product or correlation (2.5) of the kth and lth signals. After changing the order of summation and integration: ðsk ; sl Þ ¼

N X1 X1 N

ak;i al;j

i¼0 j¼0

ZT

s0 ðt

iDÞs0 ðt

jDÞdt

ð2:51Þ

0

The integral here is the inner product of two chips time-shifted to each other by (i j)D. When i 6¼ j it equals zero since chips in the integral have no overlap in time. Thus: ZT

s0 ðt

iDÞs0 ðt

jDÞdt ¼ E0 ij

0

where E0 is the chip energy. Using this in equation (2.51) produces: ðsk ; sl Þ ¼ E0

N X1 i¼0

ak;i al;i ¼ E0 ðak ; al Þ

ð2:52Þ

Equation (2.52) relates the inner product of the signals (2.50) with an inner product of N-dimensional vectors of the corresponding code sequences ak ¼ (ak, 0 , ak, 1 , . . . , ak, N 1 ). As can be seen, M orthogonal code sequences automatically generate M orthogonal signals of the type (2.50). With M  N there are many ways to construct such sequences because the case in point is simply finding M  N orthogonal N-dimensional vectors. In our discussion those vectors are binary, i.e. with components taking values of 1 only. M ¼ N orthogonal binary vectors used as rows form a square matrix called the Hadamard matrix. It is not difficult to prove (the reader may try attempt it; see Problem 7.14) that only Hadamard matrices of size divisible by 4 can exist: M  0mod4, where the symbol of congruence a  bmodc is used, meaning equal residuals of dividing integers a, b by the integer c. No answer has been found as yet as for the sufficiency of this necessary condition. A number of algorithms are known for building Hadamard matrices of the special (not sparse) lengths. One is the very popular Sylvester rule, which doubles the matrix size recursively. To explain its content let us suppose that Hadamard matrix HM of size M has been somehow found. Then the double-sized Hadamard matrix H2M can be constructed of four repetitions of HM , taken as blocks, one of them being sign-changed:

35

Classical reception problems and signal design

H2M



HM HM

HM ¼ HM





1 ¼ 1

 1

HM 1

ð2:53Þ

where the second equality expresses the rule in terms of matrix Kronecker product . The orthogonality of rows of H2M is obvious: if two rows have numbers differing by any integer but M, they have zero inner product, since their two M-element halves are orthogonal. Otherwise, the first M components of the rows coincide, while the rest of the components are opposite, which again gives zero inner product. To make use of the Sylvester algorithm one can start with matrix H2 ¼



1 1

1 1



which is evidently a Hadamard one, and construct H4 (using the symbols ‘þ’ and ‘ ’ in place of þ1 and 1 for brevity), then from H4 produce H8 , and so forth:

H4 ¼



H2 H2

2

þ þ  6 H2 6þ ¼6 4þ þ H2 þ

2

H8 ¼



H4 H4

þ 6þ 6 6  6þ 6þ H4 ¼6 6þ H4 6 6þ 6 4þ þ

þ þ þ þ þ þ þ þ þ þ þ þ

3 þ þ 7 þ 7 7 5 þ

þ þ þ þ þ þ þ þ

3 þ þ 7 þ 7 7 7 þ7 7 7 7 þ7 7 þ þ5 þ

Thereby a Hadamard matrix of any order M ¼ 2m (2, 4, 8, 16, 32, . . . ) can be built up. Rows of Hadamard matrices of this kind are also known as Walsh functions. Figure 2.12 shows baseband orthogonal BPSK signals (2.50)—Walsh functions— generated with the aid of Hadamard matrix H8 . Figure 2.13 illustrates that within this signalling mode there is no resource distribution: all signals share the common resource, fully overlapping in both the time and frequency domains. Indeed, the bandwidth of each signal is estimated as W ¼ 1/D while duration T ¼ MD, thus producing WT ¼ M ¼ Wt Tt . Orthogonality is now achieved at the cost of an appropriate signal modulation, rather than either time interval or bandwidth fragmentation. Analysing the benefits of spread spectrum orthogonality, one can note that methods of generation and processing of signals (2.50) are quite well matched to modern digital microchip circuitry (ASIC, VLSI, microprocessors). Another factor is the automatic

36

Spread Spectrum and CDMA

s1(t)

t

s2(t) t s3(t)

t

s4(t)

t

s5(t)

t

s6(t)

t

s7(t)

t

s8(t)

t

Figure 2.12 Baseband Walsh functions

M k 2

Wt = W

1

Tt = T

Figure 2.13 Resource allocation in orthogonal spread-spectrum signalling

acquiring of those merits of the spread spectrum which cannot be seen directly within the classical reception framework but are numerous and very valuable in practice (for details see Chapter 3). This gives an explanation of the great popularity of orthogonal signalling of this sort in advanced telecommunication systems (e.g. cdmaOne, UMTS, cdma2000; see Chapter 11). Now the moment has come to draw an overall conclusion on the results of Sections 2.5–2.7. As one may see, theoretically the classical M-ary transmission problem does not lean implicitly towards the spread spectrum, and in principle optimal signals can be realized as plain ones. On the other hand, there are implementation reasons, along with the desire to gain the numerous advantages pertaining to spread spectrum beyond the classical reception model. Because the latter opportunity is potentially promised by a large total necessary time–frequency resource Wt Tt  1, this can incline a system designer to prefer spread spectrum signals to plain ones.

Classical reception problems and signal design

37

2.8 Signal parameter estimation 2.8.1 Problem statement and estimation rule Everywhere in radio systems we encounter the problem of signal parameter measurement or estimation. It describes any situation when information which is interesting to an observer is carried by a current value of some signal parameter (e.g. amplitude, frequency, initial phase, time delay etc.). Therefore, to extract necessary information the observer needs to measure or estimate the corresponding parameters. Let us turn to some transparent examples. In conventional AM (FM) broadcasting, dependence of amplitude (frequency) on time carries audio information: the volume and pitch of a tone. To restore the audio message and give it out to the listener, instant values of the amplitude (frequency) should first be measured and reproduced as a continuous-time waveform. Another similar example is conventional analog TV, where both amplitude and frequency are involved in information transmission. To restore colour moving images amplitude measurement should be performed, since the luminance and chrominance components are broadcast via AM, while audio transmission is accomplished via FM and, hence, in any TV receiver frequency measurement is present. Another parameter estimation task is found in the synchronization or timing problem, where time–frequency mismatch between the received signal and a local reference clock should be measured to synchronize the second with the first. This procedure is characteristic of a great number of systems, ranging from TV horizontal and vertical synchronization channels to pilot channels of 2G and 3G mobile radio. Numerous estimation problems are typical of radar and navigation: measurement of time delay and signal arrival direction provides knowledge of the mutual distance and angle coordinates between a receiver and a target; if knowledge of a target velocity and manoeuvre is necessary Doppler frequency shift should be measured etc. The list of examples could easily be continued, since parameter measurement is an integral part of practically any system in which information is transmitted, recovered and processed. In terms convenient for our context, the parameter estimation problem may be stated in the following manner. The observation y(t) along with noise contains the signal s(t; ), which is deterministic except for the unknown constant value of the parameter

. The latter may be a vector or a scalar, depending on the specific situation. The observer, based on the analysis of y(t), should produce a decision on what value, within the range of possible ones, is taken by the signal parameter in question. This decision, in association with the problem itself also called estimate, is denoted by ^. Since noise is always present in y(t), in any separate session of reception ^ differs from the unknown true value of the parameter , and the question is how to make the optimal decision, which guarantees the smallest harm caused by this discrepancy. The simplest clue to this issue may be found in understanding that in principle the estimation problem is not anything radically new with respect to the problem of distinguishing M signals studied in Section 2.3. In fact, suppose at first that a parameter

to be measured is discrete and takes one of M competitive values 1 , 2 , . . . , M . Then the decision about which of these possible values is assumed by a signal parameter in

38

Spread Spectrum and CDMA

this specific observation is nothing more than just determining between M hypotheses on which of M competitive signals s1 (t), s2 (t), . . . , sM (t) is being received, where the signals are just copies of s(t; ), differing from each other only in value of parameter

: sk (t) ¼ s(t; k ). To cover the case of a continuous parameter with this reasoning too, one can just imagine an infinite (up to uncountable) number M of the parameter values and, consequently, of the signals to be recognized. The conclusion from these arguments is that the already well-known optimal decision strategy, the ML rule, remains applicable to the parameter estimation. This means that among all competitive values of the one should be picked as the estimate ^ which maximizes the probability of transforming the sent signal s(t; ) into the observed waveform y(t) at the channel output. For the AWGN channel this rule is equivalent to the minimum distance one, which, rewritten in the current designations, looks as follows: dðs ^; yÞ ¼ min dðs ; yÞ ) ^ is given out

ð2:54Þ



where s is vector notation of signal s(t; ). This rule produces the maximum likelihood estimate ^ by finding the value of under which signal s(t; ) is closest to the observation y(t) by the Euclidean distance. Figure 2.14 gives an illustration of it. The signal s(t; ) may be thought of as a vector s , which moves, tracing the changes of the parameter . Its extreme point travels along some trajectory, points of which map one-to-one to specific values of (Figure 2.14a). The point of the trajectory closest to the observation vector y is found according to rule (2.54) and the corresponding value of

is announced as the estimate, which is also seen in Figure 2.14b, showing the dependence of the distance between the observation and the signal copy on the value of . The ML estimate ^ is the parameter value minimizing this distance. All signal parameters can be categorized as energy or non-energy ones, the terms reflecting whether the parameter affects signal energy. If is of the second type, the energy of the signal s(t; ) does not depend on the value of : Eð Þ ¼

Z1 1

s2 ðt; Þdt ¼ E

λ=λ

d(sλ, y)

d(sλ2, y)

d(sλ, y)

sλ y sλ2 λ

d(sλ1, y) sλ1

λ

(a) Figure 2.14

(b) Illustration of ML estimation

λ

39

Classical reception problems and signal design

Amplitude and duration, for example, are energy parameters, whereas time delay, frequency and initial phase are non-energy ones. It should be clear now that estimation of a non-energy parameter is the particular case of the problem of distinguishing between competitive signals of equal energies, for which correlation rule (2.8), in the new designations, can be presented as: zð ^Þ ¼ max zð Þ ) ^ is given out

ð2:55Þ

or

^ ¼ arg max zð Þ

where according to (2.7):

zð Þ ¼ ðy; s Þ ¼

ZT

yðtÞsðt; Þdt

ð2:56Þ

0

is a correlation between the observed waveform y(t) and the signal s(t; ) in dependence on the value of the measured parameter . In the light of the physical content of the correlation, the estimation rule (2.55) has quite a transparent interpretation: the ML estimate ^ is the value of under which signal s(t; ) has maximal resemblance with the observed waveform y(t).

2.8.2 Estimation accuracy Let us recollect now the fact discussed in depth in Sections 2.2–2.3 that the fidelity of signal distinguishing is critically governed by the correlation coefficient (2.14). In the case of parameter estimation, signals to be distinguished are just copies of s(t; ) with different values of . In many practical situations the correlation of any two such copies s(t; 1 ), s(t; 2 ) depends only on their mismatch in , i.e. the difference 2 1 , rather than on values 1 , 2 separately, so that putting 1 ¼ 0, 2 ¼ leads to the following representation of the correlation coefficient (2.14) for the case of non-energy parameter : ðs0 ; s Þ 1 ¼ ð Þ ¼ E E

Z1 1

sðt; 0Þsðt; Þ dt

ð2:57Þ

As is customary for a correlation coefficient, this entity characterizes the resemblance of two signal copies depending on their mismatch in the parameter . It is evident that ( )  (0) ¼ 1, which has an instructive implication: signal copies mismatched in can not be more similar to each other than fully identical ones, which have, in their turn, unity correlation. Another property of the quantity (2.57) induced by its dependence on only ¼ 2 1 is evenness: ( ) ¼ ( ).

40

Spread Spectrum and CDMA

ρ (λ)

1 2 λ

Figure 2.15 Typical curves of ( ) in dependence on

Figure 2.15 gives example curves of ( ) in dependence on for two hypothetical signals. The solid curve is flatter than the dashed one, which means that the first signal is less sensitive to changing : the resemblance between its copies mismatched in is higher than that between copies of the second with the same mismatch. Now it is necessary to stress one detail, which was deliberately omitted above. As a matter of fact, one or another decision rule is always optimal only in some strict sense specified by an optimality criterion. The ML rule referred to here is optimal in the sense of the minimum probability of error criterion, which is quite natural and adequate when discrete signals are distinguished or a discrete parameter is measured. But it does not look that adequate when a continuous parameter is measured. It seems much more reasonable in this case to characterize estimation fidelity by a precision, i.e. magnitude of deviation " ¼ ^ of estimate ^ from the true value of . First of all, it looks quite normal to require that expectation of error " over all possible observations y(t), true value fixed, be zero for any , i.e. that estimate ^ be equal to the true on average: " ¼ ^



¼ 0 , ^ ¼ ; 8

ð2:58Þ

An estimate meeting this condition is called unbiased. But fulfilment of (2.58) does not yet allow us to consider the estimate good, since the magnitude of random scattering of the estimate around the true value is of critical importance. The variance of error varf"g ¼ ( ^ )2 is a traditional and very adequate measure of this scattering, and seeking for the rule providing unbiased estimate with minimal varf"g over all true : varf"g ¼ ð ^

Þ2 ¼ min

8

would be highly justified. Thus, minimization of variance of unbiased estimate is a natural way of pursuing greatest measurement accuracy. In estimation theory the fundamental Cramer–Rao bound is proved bordering the variance of any unbiased estimate from below. An estimate whose variance lies on this bound is called an efficient one. ‘Purely’ efficient estimates are rather infrequent but this is not a big problem from the application standpoint. The matter is that the ML estimate is asymptotically unbiased and efficient as it is again established in classical estimation theory. Physically the term ‘asymptotically’ means ‘in situations where high measurement accuracy is necessary’, or, to put it even more practically, when sufficiently high

41

Classical reception problems and signal design

SNR or observation time is provided. Therefore, in any task where high accuracy is wanted, the ML rule is optimal not only by the error-probability criterion but also by the estimate accuracy criterion. Certainly, in the real world, high measurement precision is a typical demand and this is why the ML estimates are extensively used. For the case of non-energy parameter the Cramer–Rao bound acquires on especially simple form and provides a practical tool to calculate the ML estimate variance: varf ^g ¼ varf"g 

1 00 ð0Þq2

q1

ð2:59Þ

The presence of SNR q2 ¼ 2E/N0 in the denominator of the right-hand side of (2.59) is no surprise: naturally, for any reasonable estimation rule the greater is SNR, the smaller is the error and the higher is the measurement precision. At the same time, the dependence on the second derivative of a correlation coefficient deserves a more extensive comment. As is well known from mathematical analysis, the second derivative describes the curvature or sharpness of a function at the examined point and for a convex curve is negative. The sharpness of ( ) at zero point, in its turn, shows the sensitivity of a signal towards mismatch in : the sharper it is, the faster a signal copy mismatched in loses its resemblance to the initial copy. Recollect now that estimation is a particular case of signal distinguishing and is the more reliable the smaller the signal similarity is. This gives a complete explanation as to why 00 (0) may affect the precision of measuring : when copies of s(t; ) have low resemblance even with close values of , they are more easily distinguished in comparison with the case of their stronger similarity. The latter fact points at the general trend of signal design in problems of non-energy parameter estimation. To achieve the desired result not at the cost of just ‘brute force’, i.e. energy increase, one may try to find signals with a steep dependence of correlation coefficient ( ) on . In the following sections we turn to concrete estimation problems, among which examples of measuring both energy and non-energy parameters are considered. The main idea remains as before: to find out where estimation problems may call for the use of spread spectrum.

2.9 Amplitude estimation The problem of measuring signal intensity (level, power) may be encountered in numerous applications, from TV broadcasting to digital PAM or QAM data transmission and mobile radio. Let us set it as the problem of measuring unknown amplitude A remaining constant during the observation interval [0, T]. In this statement the following signal model can be assumed: sðt; AÞ ¼ AsðtÞ where s(t) is some deterministic reference signal whose amplitude is equal to one by convention. Then signal s(t; A) is the result of scaling the reference signal by an

42

Spread Spectrum and CDMA

unknown factor A. Let E be the energy of the reference signal. Then the energy E(A) of the signal with amplitude A and its correlation z(A) with observation y(t) are: EðAÞ ¼

ZT

2

2

s ðt; AÞ dt ¼ A

0

ZT

2

2

s ðtÞ dt ¼ A E

zðAÞ ¼

0

ZT

yðtÞsðt; AÞ dt ¼ Az

0

where z¼

ZT

ð2:60Þ

yðtÞsðtÞ dt

0

is the correlation of the observation with the reference signal. Turning to the correlation version of minimum distance rule (2.8) and noticing that the roles of Ej and zj are now played by E(A) and z(A), respectively, the ML estimation procedure may be treated as maximization of the difference z(A) E(A)/2 in A. Using the equations above, this difference takes the form of a quadratic binomial Az A2 E/2 in A with the known coefficients. Its maximum is easily found, producing the ML estimate of amplitude: z A^ ¼ E Thus, calculating a correlation of the observed waveform with the reference signal and scaling the result by the constant 1/E is exactly the desired optimal amplitude estimate. After finding the expectation of z from equation (2.60): z ¼

ZT 0

yðtÞsðtÞ dt ¼

ZT

sðt; AÞsðtÞ dt ¼ A

0

ZT

s2 ðtÞ dt ¼ AE

0

it is readily seen that on average A^ strictly coincides with the true value of the amplitude,  A^ ¼ z/E ¼ A, meaning that the ML estimate of amplitude is rigorously (not only asymptotically) unbiased. No more difficult is the evaluation of variance of A^: varfA^g ¼

varfzg N0 1 ¼ ¼ E2 2E q2

ð2:61Þ

where result (2.15) is used and q2 is SNR for the reference signal (i.e. for a signal having a unit amplitude). It may be shown that (2.61) strictly reproduces the Cramer–Rao bound, proving rigorous (not only asymptotic) efficiency of the ML estimate of signal amplitude. This rare case of an estimate’s rigorous optimality is associated with the energy nature of amplitude and will not be met later when non-energy parameters are considered. Now, what sort of demand does amplitude measuring impose on signal design? As (2.61) demonstrates, nothing but sufficient energy exhaustively determining estimation precision. No complications of the signal modulation law are able to improve amplitude measurement accuracy if they do not govern the signal energy. Consequently, no momentum to the involvement of spread spectrum appears in connection with this classical reception problem.

43

Classical reception problems and signal design

2.10 Phase estimation We now address the situation where the parameter carrying useful information is the initial phase of the signal. This case is typical of coherent radar and navigation receivers, carrier reference recovery loops of PSK/QAM data transmission links, demodulators of 2G and 3G mobile radio receiver, chrominance channels of TV and many more applications. We modify the bandpass signal model (2.24), separating the constant (during observation interval) initial phase ’, which is unknown and to be measured: sðt; ’Þ ¼ SðtÞ cosð2f0 t þ ðtÞ þ ’Þ Since ’ is a non-energy parameter, E(’) ¼ E and ML estimation of phase consists in RT maximizing z(’) ¼ 0 y(t)s(t; ’) dt over all ’ 2 [ , ]. To make use of equation (2.59), note that by definition (’) is the cosine of the angle between two signal copies phaseshifted by ’; that is, between two vectors separated by the angle ’. Therefore ^ is: (’) ¼ cos ’, 00 (0) ¼ 1 and variance of the ML estimate ’ ^g  varf’

1 ;q  1 q2

Again, in common with amplitude measuring, precision of phase estimation is governed only by SNR. Thus, this classical problem is also indifferent to the signal modulation law, whenever signal energy is maintained constant, and does not stimulate spreading a signal spectrum.

2.11 Autocorrelation function and matched filter response Spread spectrum theory rests to a very large extent on the notion of a signal autocorrelation function (ACF), which is defined as the inner product of two copies of the same signal time-shifted to each other by seconds: Rð Þ ¼ ðs0 ; s Þ ¼

Z1

sðtÞsðt

ð2:62Þ

Þ dt

1

Signal time delay is a non-energy parameter (E( ) ¼ E) and scaling (2.62) by E 1 produces normalized ACF, which is simply a correlation coefficient of the time-shifted signal copies: ð Þ ¼

ðs0 ; s Þ ks k2

ðs0 ; s Þ 1 ¼ ¼ E E

Z1

sðtÞsðt

Þ dt

1

ð2:63Þ

Clearly, the latter shows how rapidly the likeness of the signal time-spaced copies dies away with the delay mismatch . According to the general properties of a correlation coefficient ( ) indicated in Section 2.8, ACF is an even function of , attaining its maximum at zero point: Rð Þ  Rð0Þ ¼ E; Rð Þ ¼ Rð Þ , ð Þ  ð0Þ ¼ 1; ð Þ ¼ ð Þ

ð2:64Þ

44

Spread Spectrum and CDMA

Using equations (2.39) and (2.34) it is not difficult to verify that for any bandpass signal (2.37) ACF: _  Rð Þ expðj2f0 tÞ ; ð Þ ¼ Re½_ ð Þ expðj2f0 tފ ð2:65Þ Rð Þ ¼ Re 2 where R_ ð Þ ¼ ðS_ 0 ; S_ Þ ¼

Z1 1

S_ ðtÞS_  ðt

ð2:66Þ

Þ dt

is the ACF of the complex envelope S_ (t), or, in other words, the modulation law. The normalized version of ACF (2.66): Z1 ðS_ 0 ; S_ Þ ðS_ 0 ; S_ Þ 1 ¼ S_ ðtÞS_  ðt _ ð Þ ¼  2 ¼ 2E 2E S_  1

Þdt

ð2:67Þ

being the correlation coefficient of two time-shifted copies of the complex envelope S_ (t), serves (after taking the modulus) as a measure of the rapidness with which the timeshifted modulation law loses similarity with the initial one when the mismatch grows. As may be seen from (2.65), ACF ( ) of a bandpass signal s(t) is a bandpass signal itself whose modulation law is ACF _ ( ) of the complex envelope of s(t). In particular, the real envelope 0 ( ) of ACF of s(t) is the modulus of _ ( ): 0 ( ) ¼ j_ ( )j, which is illustrated by Figure 2.16. Any ACF can be obtained physically as an output of the correlator, i.e. the device running the straightforward operations set up by definitions (2.62) or (2.66). In this case calculations for a range of are fulfilled point by point, i.e. repeatedly in time or in hardware. An alternative solution is the matched filter, i.e. a linear system with the pulse response reproducing a mirror image of the signal: h(t) ¼ s(T t), where T is, as usual, signal duration and an immaterial proportionality factor is set to be one. This filter emerges every now and again as an integral element of an optimal receiver in the

1 ρ 0(τ)

ρ (τ)

τ

Figure 2.16

Bandpass signal ACF

45

Classical reception problems and signal design

AWGN channel, but its optimality often goes far beyond this specific channel model. In particular, it maximizes output SNR among all linear systems, signal given. In our current context the matched filter is important due to its ability to calculate and reproduce ACF as a real-time output waveform. To examine this, apply the signal s(t) to the input of the filter matched to s(t). The filter response r(t) may then be calculated as the convolution integral: rðtÞ ¼

Z1

sðÞhðt

¼

Z1

sðÞs½

1

1

Þ d ¼ ðt

Z1

sðÞsðT

1

Tފ dt ¼ Rðt

t þ Þ d ð2:68Þ



and duplicates the ACF in real time with predictable delay equal to the signal duration. To elucidate what was said, consider Figure 2.17. The rectangular baseband pulse s(t) of duration T (Figure 2.17a) has a triangular ACF R( ) of duration 2T with a maximum at the zero point (b, dashed line). In accordance with equation (2.68) the matched filter response reproduces a copy of this ACF delayed by the signal duration T so that maximal voltage at the filter output occurs at the moment when the input signal ends (b, solid line). If the pulse were bandpass with a rectangular envelope s(t), its ACF would be a triangular bandpass pulse (c, dashed bold line) and its T-delayed copy would appear at the bandpass matched filter output (c, solid bold line). The maximum of the filter response to the signal the filter is matched to always occurs at the moment of signal ending (at least no earlier), since this filter processes the whole signal. It is very instructive to note that for a bandpass signal moments of maximal envelope and maximal value of carrier cosine at the matched filter output always coincide, since ACF always assumes its maximum at the zero point (see also Figure 2.16).

s (t)

(a) –T/2

t

T /2

ρ(τ)

(b)

ρ.0(τ)

–T

(c)

0

r(t) 0

τ, t

T r(t)

ρ(τ) 0

τ, t

Figure 2.17 Illustration to the definition of ACF and its forming by the matched filter

46

Spread Spectrum and CDMA

2.12 Estimation of the bandpass signal time delay 2.12.1 Estimation algorithm The problem we address in this section is among the most frequently encountered. It is typical of TV broadcasting (synchronization channels), digital mobile radio (pilot channels, timing recovery loops), radar (target distance measurement), space-based and groundbased navigation (beacon distance measurement) and so forth. To operate adequately, practically any modern information processing system needs to retrieve timing data from the received waveform, and this is exactly what is meant by time delay estimation. Suppose that a bandpass signal (2.37) s(t) ¼ Re[S_ (t) exp (j2f0 t)] passing through the channel acquires unknown time delay and initial phase ’0 , i.e. takes the form: sðt; ; ’0 Þ ¼ sðt

; ’0 Þ ¼ RefS_ ðt

Þ exp½j2f0 ðt

Þ þ j’0 Šg

In many situations phase ’0 is random and uniformly distributed over the interval [ , ], i.e. it has no bearing on the only object of interest—the time delay . Let us incorporate the phase component caused by delay into the integral initial phase ’ ¼ 2f0 þ ’0 . The latter, remaining random and uniformly distributed over [ , ], is again independent of , i.e. contains no information on it due to the destructive contribution of ’0 . Then the received signal may be represented by the following: sðt

; ’Þ ¼ Re½S_ ðt

Þ expðj2f0 tÞ expðj’ފ

ð2:69Þ

where time delay is an unknown useful parameter to be measured and ’ is a useless initial phase, whose uncertainty may only complicate the measurement of . As was stated in Section 2.8, any estimation procedure is a particular case of signal distinguishing. In the case in question, we need to distinguish between multiple copies of signal (2.69) that differ from each other by value of the time shift , a nuisance parameter—initial phase ’—being an extra care. Fortunately, there is a straightforward way to overcome the signal indeterminacy related to the randomness of ’: in Section 2.5 it was shown that optimal choice between noncoherent signals is performed by distinguishing between their deterministic modulation laws, i.e. complex envelopes. In the delay estimation, consequently, time-shifted copies of the signal complex envelope S_ (t) should be compared and one of them declared received. It is the time shift of the latter which is given out as the ML estimate ^ of time delay. Certainly, preference for this copy over the rest is based on its minimum distance from the received complex envelope Y_ (t) or, taking into account that time delay is a non-energy parameter, on maximal correlation with Y_ (t). This correlation is evaluated by correlation modulus (2.47), which can be rewritten taking into account that the role of the signal number now belongs to the value of :   T  Z    ð2:70Þ Zð Þ ¼  Y_ ðtÞS_ ðt Þdt   0

Based on this entity estimation rule Z(^ ) ¼ max Z( ) is absolutely transparent physic

ally: the ML estimate ^ is just the time delay under which the signal modulation law has maximal resemblance with the observed one.

47

Classical reception problems and signal design

Correlator Z(τ1) . S(t – τ1) . Y(t)

Selection of largest

Correlator Z(τ2)

τˆ

. S(t – τ2)

Correlator Z(τM) . S(t – τM)

Figure 2.18

Correlator-bank implementation of the ML estimate of time delay

One possible solution to implement this estimation rule is a bank of correlators, shown in Figure 2.18. The observed complex envelope is processed in parallel by M correlators, whose reference signals are time-shifted copies of the signal complex envelope. At the correlator outputs values of Z( i ), i ¼ 1, 2, . . . , M are present, and the rightmost block compares them to select the largest. The ML estimate is the delay of the reference in the correlator whose output is maximal. Of course, this structure treats the time delay as though it takes only discrete values. When this is not the case it simply quantizes continuous and the number of correlators (or, which is the same, discrete values i ) should be chosen sufficient to make the quantization error tolerably low. The matched filter offers an alternative version of delay estimator. Let the observation y(t) be applied to the filter matched to the signal s(t). Find the output waveform r(t) using the convolution integral and filter pulse response h(t) ¼ s(T t): Z1

rðtÞ ¼

1

yðÞhðt

Þ d ¼

Z1 1

yðÞsðT

t þ Þ d:

This integral, being the inner product of y(t) and s(T t þ ), may be calculated with the aid of equations (2.39) and (2.34): 2 T 3 Z Z1 1 4  yðÞsðT t þ Þ d ¼ Re rðtÞ ¼ y_ ðÞs_ ðT t þ Þ d5 2 182 0 9 3 < 1 ZT =  Y_ ðÞS_ ðT t þ Þ d  expð j2f0 TÞ5 expðj2f0 tÞ ¼ Re 4 : 2 ; 0

Comparing this result with the general bandpass signal model (2.37), one can see that the square brackets single out nothing but the complex envelope at the filter output.

48

Spread Spectrum and CDMA

y(t)

Matched filter

Envelope detector

rd(t)

Maximum fixer

τˆ = tm – T

(a) rd(t)

tm = τˆ + T

0

t

(b) Figure 2.19 Matched filter implementation of the ML estimate of time delay

Therefore, the real output envelope (amplitude modulation) defined as the modulus of the expression within the square brackets:   1   Z  1  _ ðÞS_  ½ ðt Tފ d  ¼ 1 Zðt TÞ ð2:71Þ Y  2 2   1

i.e. replicates in real time (with immaterial scaling by a factor 1/2) a copy of the correlation modulus (2.70) time-shifted by the known signal duration. This points directly to the possible structure of ML estimator of delay shown in Figure 2.19a. The observation y(t) is first filtered by a matched filter and then passes through the envelope detector. The last unit in the structure registers the time moment tm when the detector output waveform rd (t) takes a maximum value and the desired ML estimate ^ is obtained after subtraction of the known constant T from tm (Figure 2.19b). The scheme of Figure 2.19 seems more transparent for explaining the idea, but many practical software-based ML estimators may appear not so directly identifiable with either of the two structures just discussed.

2.12.2 Estimation accuracy According to equation (2.59), the variance of estimation of depends on the steepness with which the time-shifted signal copy loses its similarity with the initial one. But in the case of random-phase signals only the deterministic complex envelopes are being compared to carry out the ML estimate. The similarity of time-mismatched copies of the complex envelope is characterized by the envelope of the signal ACF (2.65):     Z1  1   _ _ ð2:72Þ 0 ð Þ ¼ j_ ð Þj ¼  SðtÞS ðt Þ d  2E   1

49

Classical reception problems and signal design

rd(t)

r′d(t)

tm0 tm

t

tm0

tm

t

τc

(a)

(b)

Figure 2.20 Illustration to the time measuring accuracy

and therefore its steepness should affect the error variance of measuring time delay, which can be strongly argued on physical grounds. Indeed, as is seen from equations (2.70) and (2.71), ACF modulus (2.72) is the noise-free envelope at the matched filter output (neglecting constant factor) taking a maximum value at some ‘true’ time-position tm0 (Figure 2.20a, solid line). When noise is added the time-position tm of this maximum fluctuates with respect to the true point (Figure 2.20a, dashed line) spanning the range depending on the sharpness of the signal envelope at the filter output, i.e. of the ACF modulus (2.72). To make the latter more evident, note that fixing the moment of a maximum of the detector output rd (t) is tantamount to registering the time-point where its derivative r0d (t) crosses the zero level (provided it is selected properly against spurious ‘zero-points’ caused by possible side maximums). This is illustrated by Figure 2.20b. When SNR is high enough, deviation " ¼ tm tm0 is small and we may assume that the noisy (dashed) curve r0d (t) is linear within the range [tm0 , tm ], having the same slope as the noiseless (solid) curve has at the point tm0 . Hence, solving the right triangle seen in Figure 2.20b, " can be found as a result of division of its dashed-dotted leg by the steepness of the noiseless curve r0d (t) at the point tm0 , i.e. by the second derivative r00d (tm0 ). The latter, in its turn, is exactly 000 (0), so that "  r0d (tm0 )/000 (0). On the other hand, variance of scattering of r0d (tm0 ) around the noiseless zero value is greater the smaller is SNR and the higher is the rate of random change of the noisy detector output rd (t) (dashed line in Figure 2.20a). The sharpness of ACF of a random process tells us about the rate of its change, and ACF of the detector output random process under high SNR repeats the envelope of ACF at the detector input. The latter envelope, when the filter is matched to the signal, is nothing but the envelope 0 ( ) of the signal ACF. Since the sharpness of any ACF is measured by its second derivative at zero point with a minus sign, the variance of r0d (tm0 ) is proportional to 000 (0). Then: varf"g ¼

varfr0d ðtm0 Þg    00 ð0Þ2 0

1 000 ð0Þ

is inversely proportional to the sharpness of the signal ACF 000 (0) as was predicted earlier and as follows from the Cramer–Rao bound (2.59). We thereby came to quite an important conclusion: time-measurement accuracy is critically governed by the signal ACF sharpness, and the sharper is ACF, the smaller is the variance of the ML estimate of time delay .

50

Spread Spectrum and CDMA

In parallel with 000 (0), another indicator of signal ACF sharpness can be introduced, which we will call the correlation spread and denote c . This parameter characterizes signal ACF width (see Figure 2.20a) and—like duration or bandwidth—should be defined by a convention, since ACF can be of rather complicated shape and fall to zero only asymptotically. In the light of the meaning of ACF, we believe that signal copies (or copies of the complex envelope) with mutual time-shift < c have significant resemblance while with > c their resemblance is negligible. It is clear that the conclusion above may be reformulated in terms of this new entity: signals with narrow ACF, i.e. small correlation spread, are generally preferable for the high precision of time-delay estimate. Continuing, we may recall one of the basic facts of spectrum analysis following directly from result (2.72) after applying the Parseval theorem to it: signal ACF and energy spectrum are related to each other by the Fourier transform. In terms of the complex envelope:  1 Z   1   ~_ 2 0 ð Þ ¼ S ðf Þ  expðj2f Þ df  2E  1

     

~_ (t) is physically (neglecting a proportionality where the complex envelope spectrum S coefficient) a bandpass signal spectrum moved to the baseband area. Then according to the general Fourier transform property, c  1/W, or in other words, the narrower is ACF the wider is the signal spectrum and vice versa. The implication of this is straightforward: a possible way of improving time-measurement accuracy consists in employing signals with a wide spectrum. To come to the same conclusion formally, one may differentiate the last expression of the ACF envelope and substitute the result into the Cramer–Rao bound (2.59). With some tedious work, this leads to the equation often referred to as the Woodward formula: varf^ g 

1 ð2Wrms Þ2 q2

; q1

where the signal root-mean-square (rms) bandwidth is introduced:

Wrms

1 ¼ 2E

Z1 1

   ~_ 2 f 2 S ðf Þ df

It may appear difficult to understand why a measure like this reports about the spectrum width. In this case analogy with the more customary probabilistic scattering parameter is advisable. Variance R 1of the random variable x with zero mean and PDF W(x) is by definition varfxg ¼ 1 x2 W(x)dx, characterizing a scattering range of x around its expectation, or, which is equivalent, width of PDF W(x). But the normalized energy    ~_ 2 spectrum  S (f ) /2E is non-negative and satisfies the condition:

Classical reception problems and signal design

51

 Z1    ~_ 2  S ðf Þ 2E df ¼ 1 1

i.e. may be treated as a PDF of some appropriate random variable. Then Wrms is a measure of scattering of this ‘dummy’ random variable, and by that characterizes the    ~_ 2 width of an energy spectrum  S (f ) .

Thus, roughly speaking, the criterion for good signals in time-measurement tasks is: signals with short ACF (small correlation spread c ) or, equivalently, wide bandwidths W, are of the primary interest. Compared with the previously considered two estimation problems the situation looks pretty new: there exists a sustainable resource to improve estimation fidelity beyond a brute-force course, i.e. just extra energy expenditure. It should be stressed now that ‘wide band’ and ‘spread spectrum’ are not synonyms. As a matter of fact, if conventions adopted on the correlation spread c and the signal duration T definitions are sound enough, signal copies shifted by more than T are practically non-overlapping, i.e. have negligible inner product or resemblance. Therefore, c  T, showing that shortening signal ACF and, consequently, widening its bandwidth can be achieved trivially by shortening the signal itself. However, going this way one should not forget that SNR depends on signal energy E ¼ kp PT where P is the signal peak power and kp is a coefficient determined by the signal shape. It has to be clear that preserving SNR when the signal is being shortened requires a proportional increase of peak power. Consequently, in the pursuit of higher and higher precision, it is possible to arrive at the situation where the necessary peak power becomes prohibitively large. Generally, very high transmitted power entails large mass and dimension of transmitter equipment and an energy source. In addition to that, short high-power pulses may appear substantially damaging for neighbouring systems and the surrounding ecology. A more elegant way of improving the time-measurement accuracy is prompted by the fact that signal shortening is not the only method of widening the spectrum or, which is the same, reducing the correlation spread. Consider a signal whose duration T is large enough to provide necessary energy, i.e. SNR, in combination with acceptably low peak power P. Suppose that the internal angle modulation law is found, making a signal correlation spread much smaller than signal duration: c  T. Then, signal ACF is sharp, providing high-accuracy estimation of time delay, despite the long duration of the signal itself. But in the light of the dependence between the correlation spread and the bandwidth c  1/W inequality c  T means that the signal has a large time–frequency product WT  1, i.e. it is a spread spectrum one. Putting it another way, involvement of the spread spectrum allows the contradiction between peak power and estimation precision to be removed: necessary energy is put into a signal at the cost of duration, not power, while high measurement accuracy is achieved by designing an appropriate modulation law. Physically, fulfilment of the condition c  T means that a long signal becomes short after processing in the matched filter of the estimator shown in Figure 2.19a. It should be clear that this matched filter time-compression phenomenon is achievable only with spread spectrum signals. In principle, any signal may be time-shortened in some purposely designed (generally mismatched) filter, e.g. an equalizer, but for plain signals

52

Spread Spectrum and CDMA

the price of this is loss in SNR, and only spread spectrum signals promise best ‘noiseclearance’ simultaneously with the time compression. At the same time it has to be understood that the spread spectrum condition WT  1 is just the necessary one, and finding signals combining long proper duration with a sharp ACF is a rather sophisticated task. There is further discussion of this in Chapter 5. Consider Figure 2.21 where waveforms are shown simulated by Matlab. The plots in column (a) present, respectively, a plain bandpass bell-shaped pulse, matched filter response to it (delayed ACF) and 10 superimposed noisy realizations at the detector output. The plots of column (b) show similar waveforms but for the spread spectrum signal, which is a linear-frequency-modulated pulse having the same shape, duration and energy as that of column (a). The time-compression effect for case (b) manifests itself clearly and results in a noticeably narrower range of fluctuations of the time position of a maximum at the detector output in comparison with case (a). This demonstrates convincingly how spread spectrum can improve time-measurement accuracy without compromising peak power. We now formulate the following conclusion. When no peak power limitation is imposed, the classical problem of time-delay estimation does not appeal strongly to the spread spectrum. However, spread spectrum is an imperative demand when tough peak power constraints need to be obeyed. Note in passing that the latter situation is quite typical of the pulse radar, which explains why this application area has for decades been stimulating the development of spread spectrum technology.

1

0.5

1.0

1.5

1 0 –1 0.0

0.5

1.0

1.5

2.0

1.5 1.0 0.5 0.0 0.0

0.5

1.0 t/T

(a)

1.5

2.0

0 –1 0.0

2.0 Noiseless MF output

Noiseless MF output

–1 0.0

MF output envelope

s(t)

0

0.5

1.0

1.5

2.0

0.5

1.0

1.5

2.0

0.5

1.0 t/T

1.5

2.0

1 0 –1 0.0

MF output envelope

s(t)

1

1.5 1.0 0.5 0.0 0.0

(b)

Figure 2.21 Illustration of time estimation and matched filter time-compression effect

53

Classical reception problems and signal design

2.13 Estimation of carrier frequency Consider now the situation where signal carrier frequency is an unknown informative parameter. This problem is as widespread as the previous one. It is met in radar measuring target velocity via Doppler frequency shift (e.g. police radar for road traffic monitoring), reference recovery loops of 2G and 3G mobile telephone receivers, automatic frequency control system in FM and TV receivers and so on. In actual practice it is typical that only bias F versus the carrier frequency nominal value f0 has to be measured, whereupon a signal model can be written as:

sðt; F; ’Þ ¼ Re S_ ðtÞ exp½j2ðf0 þ FÞt þ j’Š ¼ Re S_ ðt; FÞ expðj2f0 tÞ expðj’Þ

where S_ (t; F) ¼ S_ (t) exp (j2Ft) is the signal complex envelope including the linear phase drift due to the frequency shift F, and ’ is again a nuisance parameter—random initial phase containing no information on F. Because of the non-energy nature of F, the correlation rule Z(F^) ¼ max Z(F) is F

relevant, where the correlation modulus Z(F) is again produced by a slight adaptation of (2.47) with F playing the role of k:   T   T  Z  Z          _ _ _ _ ZðFÞ ¼  Y ðtÞS ðt; FÞ dt ¼  Y ðtÞS ðtÞ expð j2FtÞ dt     0

0

The scheme of Figure 2.18 may be used to realize this optimal estimation if instead of time-shifted copies of the complex envelope, its frequency shifts S_ (t; Fk ) ¼ S_ (t) exp (j2Fk t), k ¼ 1, 2, . . . , M are used as correlator references. On the other hand, it is seen from equation (2.71) that the amplitude at the output of the matched filter, which is tuned to the frequency f0 þ Fk , takes a value Z(Fk ) (neglecting a coefficient) at the moment of signal ending T. Thus, an alternative structure (see Figure 2.22) may be used containing a bank of M matched filters, the kth one being detuned with respect to the nominal frequency f0 by Fk Hz. After amplitude detecting and sampling of detector outputs at moment T, the set of Z(Fk ) is obtained, the largest of

y(t)

Matched filter F1

Envelope detector

Matched filter F2

Envelope detector

Matched filter FM

Envelope detector

Selection of largest



Sampling at t = T

Figure 2.22 Matched filter implementation of the ML estimate of frequency

54

Spread Spectrum and CDMA

which is then selected to derive the ML estimate F^ as a frequency mismatch of the filter outputting the largest Z(Fk ). Clearly, continuous F here is again quantized and the number of filters M should be sufficient to tolerate the quantization error. Precision of the frequency measurement in accordance with equation (2.59) is governed not only by SNR but also by the sharpness of the correlation between frequencyshifted signal copies in dependence on their mutual frequency mismatch. Due to the phase randomness, we operate with the complex envelope, and the resemblance between its frequency-detuned copies S_ (t; 0) and S_ (t; F) is characterized by the modulus of the correlation coefficient (2.44):         Z1 Z1    1   1 2       _ _ _ Sðt; 0ÞS ðt; FÞ dt  ¼  SðtÞ expð j2FtÞ dt  0 ðFÞ ¼ j_ ðFÞj ¼    2E 2E 1 1     Z1  1 2  ð2:73Þ ¼ S ðtÞ expðj2FtÞ dt   2E 1

As is seen, this correlation coefficient as a function of F duplicates in its shape the amplitude spectrum of the signal squared real envelope. Since it is a real envelope, i.e. the amplitude modulation law is always some baseband signal, it follows from the Fourier transform properties that the longer is the signal, the sharper is 0 (F). An appropriate name for the extension of 0 (F) along the frequency axes is the ‘envelope frequency spread’. Denoting it by Fe we have from the fact just mentioned Fe  1/T. Thus, beyond the ‘brute force’ way of increasing the signal energy, it is possible to improve the accuracy of the frequency measurement by employing a signal having a rather compact spectrum of the envelope (small Fe ), i.e. sufficiently long duration T. Formally, this conclusion may be deduced again by evaluation of the second derivative of (F) and substituting it into the Cramer–Rao bound (2.59): varfF^g ¼

1 ð2Trms Þ2 q2

where the rms duration Trms characterizes the extension of a signal in time just as rms bandwidth Wrms characterizes a signal spectrum extension. Two physical aspects may be referred to at this point. First, increase of precision with signal duration T is easily understood: frequency is the velocity of a signal complete phase angle and, like any velocity, is measured more reliably when the angle increment is observed over a longer time interval. Second, the time–frequency duality shows itself in comparison of the frequency and time-delay estimates. Indeed, while the time-measurement precision is governed by a signal extension in the frequency domain (bandwidth W), frequencymeasurement precision is controlled by a signal extension in the time domain (duration T). The result above bring us to the conclusion that when the only informative parameter is a signal frequency there is no momentum to resort to the spread spectrum, since, apart from the energy, only signal duration is influential as to the estimate accuracy. This explains why the Doppler speed-monitoring radar very often operates with the plainest unmodulated CW harmonic signal.

55

Classical reception problems and signal design

2.14 Simultaneous estimation of time delay and frequency Our next subject is the situation where both time and frequency F shifts of the received signal are unknown and informative, i.e. to be measured. This matches many practical scenarios. In digital communications, e.g. 2G and 3G mobile radio, a receiving session typically starts with synchronizing the local reference with the received signal. This procedure consists of measuring time–frequency misalignment of the local clock against the received signal and subsequent time–frequency adjustment of the former towards its synchronism with the latter. In radar technology to measure simultaneously the distance and the velocity of the target relative to the receiver the signal time delay and Doppler frequency are estimated. In navigation, e.g. GPS, much the same sort of estimation serves to measure the user’s own location and velocity. There are many similar examples. In distinction to the material of Sections 2.9–2.13 the parameter to be estimated is now the two-dimensional vector ¼ ( , F) rather than a scalar. Accordingly, the model of the received signal combines the two of Sections 2.12 and 2.13: sðt; ; F; ’Þ ¼ Re S_ ðt; ; FÞ expðj2f0 tÞ expðj’Þ where S_ (t; , F) ¼ S_ (t ) exp (j2Ft) is the complex envelope incorporating both the time delay and the frequency shift; and ’ is, as before, a non-informative initial phase. It is obvious that now the correlation rule of estimating , F operates with the correlation modulus:    T  T   Z Z       ð2:74Þ Zð ; FÞ ¼  Y_ ðtÞS_ ðt; ; FÞ dt ¼  Y_ ðtÞS_ ðt Þ expð j2FtÞdt     0

0

which indicates how closely the time and frequency biased copy of the signal complex envelope S_ (t; , F) resembles the observed complex envelope Y_ (t). Finding and F, which maximize such a resemblance, provides the pair of the ML estimates ^, F^: Z(^ , F^) ¼ max Z( , F). , F

As previously, one can imagine the correlator-bank structure of the ML estimator where references of different correlators are the copies S_ (t; , F) ¼ S_ (t ) exp (j2Ft) with different values , F. More instructive, however, is the matched-filter-based scheme combining those of Figures 2.22 and 2.19a and illustrated by Figure 2.23. It follows directly from the comparison of equations (2.74) and (2.71) showing that (neglecting a constant factor) Z( , F) is duplicated by the real envelope at the output of the matched filter, the filter being frequency-detuned by F. M filter-detector branches are taken and each of them is tuned to its specific frequency, securing thereby estimation of F, while estimation of is obtained by fixing the point of a maximum value at the detector output. The ‘Selection of largest’ unit implements both these operations together, fixing the time moment where the global maximum among the output values of all the branches occurs. Then this moment itself (after subtracting the signal duration) gives ^, while the frequency tuning of the branch at whose output the global maximum is registered provides F^. The estimation precision depends on the rapidity with which the resemblance between the time–frequency mismatched copies S_ (t; 0, 0) and S_ (t; , F) of the signal complex

56

Spread Spectrum and CDMA

y(t)

Matched filter F1

Envelope detector

Matched filter F2

Envelope detector

Matched filter FM

Envelope detector

Selection of largest

F

Figure 2.23 Matched filter implementation of the time delay and frequency ML estimate

envelope decays with growth of , F. In other words, the precision is governed by the sharpness of the modulus of the correlation coefficient (2.44):     Z1  1  0 ð ; FÞ ¼ j_ ð ; FÞj ¼  S_ ðt; 0; 0ÞS_ ðt; ; FÞ dt   2E 1     Z1  1   _ _ ¼ ð2:75Þ S ðtÞS ðt Þ expð j2FtÞdt  2E 1

as a function of the two variables , F. This function, often called the Woodward ambiguity function, is crucially important in signal theory. Geometrically it may be plotted as a three-dimensional surface over the plane , F having a maximum equal to one at the origin: 0 ( , F)  0 (0, 0) ¼ 1. Figure 2.24 gives an example view of the ambiguity function. When F ¼ 0 signal copies are time-detuned only, and in accordance to it, the ambiguity function (2.75) turns into the ACF modulus (2.72): 0 ( , 0) ¼ 0 ( ). On the other ρ0(τ, F) 1

F

τ

Figure 2.24 An example of ambiguity function

57

Classical reception problems and signal design

hand, with no time shift ¼ 0 signal copies are mismatched in frequency only, and the ambiguity function becomes the spectrum (2.73) of the squared signal amplitude modulation law: 0 (0, F) ¼ 0 (F). In other words, the signal ACF and squared envelope spectrum represent profiles of the ambiguity function along the vertical planes ¼ 0, F ¼ 0, respectively. Returning to the structure of Figure 2.23, one may see that in the case of noiseless observation the kth channel of it reproduces in real-time the profile of the ambiguity function along the vertical plane F ¼ Fi . As follows from the reasoning above, the only extra-energy-free resource of increasing the accuracy of the time–frequency estimation is sharpening the ambiguity function. The latter should die rapidly enough along any direction in the plane , F if no material a priori information about possible values of , F is involved. One relevant way to characterize the sharpness of the 0 ( , F) is to consider its horizontal section (called ambiguity diagram) at some predetermined level, e.g. 0.5. Figure 2.25 exemplifies such a section. Since the extensions of the two basic profiles 0 ( ) and 0 (F) are measured by the correlation spread ( c  1/W) and envelope frequency spread (Fe  1/T), those spreads define automatically the sizes of the section along the axes , F. Certainly, the sharper the ambiguity function, the smaller is the square of the ambiguity diagram. The latter is proportional to the product c Fe  1/WT, which entails the statement: only spread spectrum signals allow increasing the accuracy of time delay (frequency) estimation without compromising the accuracy of measuring frequency (time delay). Indeed, for any plain signal WT  1 and, consequently, c Fe  1, so that making an ambiguity function sharper along one direction (e.g. ) is not possible without simultaneously stretching it along the other direction (F). With spread spectrum signals the opportunity exists to escape the contradiction between the extensions c , Fe of an ambiguity function, or equivalently between the signal duration and bandwidth, similarly to what was studied in Section 2.12. Specifically, an appropriate internal angle modulation secures signal bandwidth W (correlation spread c ) and thereby time-measurement accuracy, while the choice of an appropriate duration T can be carried out independently to guarantee the necessary frequencymeasurement accuracy. Comparing the statement we arrived at with the previous ones, we see that among all the classical reception problems examined so far, simultaneous time–frequency F Fe /2



τc 2

τc 2

τ

–Fe /2

Figure 2.25 Ambiguity diagram: horizontal section of the ambiguity function

58

Spread Spectrum and CDMA

estimation is the first appealing to the spread spectrum philosophy in an absolutely categorical way. There are no other means to make the requirements for high precision in both time and frequency estimations non-conflicting than the involvement of spread spectrum signals.

2.15 Signal resolution It is extremely typical of many practical systems that the received signal is actually a superposition of many copies of the original ‘pure’ signal, each copy having its specific amplitude, phase, time delay and frequency shift. Time-overlapped, these copies interfere with each other, creating a rather complicated resulting signal and often hampering the extraction of the necessary information. The procedure directed to separating the interfering signal copies or neutralizing their mutual harmful effects is called signal resolution. There may be different ways of treating this problem in terms of the classical reception approach depending on what the final objectives are. All of them, however, are again based critically on the category of the signal copies’ distance or resemblance. To explain the idea better, consider the very indicative case of the time resolution. Start with the bandpass signal s(t) ¼ Re[S_ (t) exp (2f0 t)] and assume that two of its copies having equal amplitudes and different time delays 1 ¼ 0, 2 ¼ arrive at the receiver input. Then the superposition waveform: sr ðtÞ ¼ sðtÞ þ sðt

Þ ¼ Ref½S_ ðtÞ þ S_ ðt

ފ expðj2f0 tÞg

is strongly determined by the mutual time shift in comparison to both the signal duration T and carrier frequency as well as by the ‘fine’ details of the signal modulation. Figure 2.26 illustrates several situations for the example of the plain bell-shaped pulse, plot a corresponding to the ‘pure’ signal itself, while value for each of the three other plots is given in terms of the carrier frequency f0 . The case when the time difference is greater than the signal duration T (plot b) causes no problem, since the signal copies are completely separated in time and an

(a)

t T = 20/f0

τ = 20/f0

(b)

t τ = 4/f0

(c)

t τ = 4.5/f0

(d) Figure 2.26 Illustration of the time-resolution problem

t

Classical reception problems and signal design

59

observer is able to recognize that there are two of them. Obviously, no interference effect is present and if, apart from time position, some other signal parameters are of interest this information may be retrieved from every copy without any major difficulties. Another matter is the situation where signals are strongly overlapping. Then interference may lead either to amplifying (if the copies are nearly in-phase, plot c) or attenuation of the signal (the copies’ phase difference is around , plot d). The likely problems of an observer are clearly seen, considering that the received waveform is always corrupted by channel noise. He can hardly recognize the presence of more than one copy (and be fully confident that the interference does not damage the information retrieved, plot c), or meets prohibitively low SNR (d). Scenarios of this kind are widespread throughout systems related to transporting and collecting information. The main physical phenomena underlying them are the limited channel bandwidth and multipath wave propagation. The latter will be discussed in more detail in Section 3.5. For now it is enough to look briefly at some characteristic examples. In digital telecommunications two sorts of channel distortion are often among the most troublesome: intersymbol interference (ISI) and fading. They are somewhat akin, both being the result of the linear summation of the multitude of the weighted and delayed signal copies. When the range of delays surpasses the signal correlation spread, or, equivalently, the channel transfer function is explicitly nonuniform within the signal spectrum, the received superposition is substantially distorted against the original signal, which is typical of ISI or frequency-selective fading. Nonselective or flat fading appears when delays of signal copies differ insignificantly in terms of the signal correlation spread (the channel transfer function is nearly uniform) but are sufficient to create destructive mutual phase shifts between copies, causing risk of a perceptible loss in the resulting signal power. Clearly, the problem of resolution, i.e. effective separation of the signal time-shifted copies, is directly relevant to the task of ISI suppression. Analogously, in radar a set of time-shifted signal copies may enter the received waveform due to reflection of the emitted pulse by multiple targets. One of the primary necessary capabilities of radar is to tell how many targets are present on some definite direction and to measure the distances to all of them. It is immediately seen that the scenarios described by Figure 2.26b are easy from this standpoint, while the situations where inter-target distances are small enough to cause overlapping of their echoed signals (Figure 2.26c, d) demonstrate the essence of the resolution problem. Multipath propagation is also typical of navigation problems. In many ground-based systems its nature is attributed to the ionosphere reflecting strongly long and medium waves. Due to this the earth’s surface and the ionosphere create a waveguide, along which many alternative propagation modes, i.e. paths, may exist. In space-based systems the same problem arises, since along with the line-of-sight signal from the satellite multipath signals caused by reflections from some surrounding objects (e.g. ship masts or deck erections) may also reach a receiver input. All these situations fall well within the realms of the resolution problem. Analysing Figure 2.26, it would seem reasonable to jump to the conclusion that the appropriate way of achieving good time-resolution consists in employing short signals. Certainly, shortening a signal may be a solution to the problem; however, the limitations discussed thoroughly in Section 2.12 remain in force. When pursuing high-resolution

60

Spread Spectrum and CDMA

capability one cannot simply reduce the signal duration; a proportional increase of the peak-power should also be provided to preserve the necessary SNR. Thus, peak-power constraints make the potency of this simple strategy not very encouraging. Fortunately, an alternative and much more elegant way of solving the time-resolution problem still exists, actually described previously. Just as in the case of time-measurement, it is the duration of the signal ACF but not of the signal itself that affects resolution capability, since clearing the signal off the noise by the matched filter may be looked upon as an integral part of any reception procedure. Consequently, the requirement for a small correlation spread c or sharp ACF is dictated by the time-resolution, duplicating the one formulated in the problem of time-delay estimation. Putting it differently, the timeshifted signal copies may strongly overlap and interfere with each other severely, but if their mutual time shift exceeds the correlation spread c they will be observed as nonoverlapping at the matched filter output, i.e. will be resolved. Clearly, we are arriving again at the idea of Section 2.12: necessary signal energy (SNR) is secured by a high signal duration T allowing compliance with the peak-power limitation, while the proper choice of the internal angle modulation is responsible for a sufficiently small correlation spread c  T. Then the time-compression effect in the matched filter will be able to provide separation of the overlapping signal copies; that is, their successful resolution. This is potentially achievable only with spread spectrum signals, whose time–frequency product WT  T/ c  1. Therefore, we may literally cite the conclusion of Section 2.12 in application to time resolution. When no peak-power limitation is imposed the problem does not appeal strongly to spread spectrum. However, spread spectrum is a vital demand when tough peak-power constraints must be obeyed. Figure 2.27 presents two indicative situations simulated in Matlab. Column (a) shows the bell-shaped plain pulse s(t), its -shifted copy s(t ) strongly overlapping with s(t), superposition of s(t) and s(t ) at the matched filter input and the filter response to this superposition. Column (b) contains similar plots for the spread spectrum (linearfrequency modulated) bell-shaped pulse of the same duration and energy. With identical time-shifts of the copies in both cases the second signal shows excellent resolution performance—the two signal copies are fully separated—while the pattern with the first one shows no resolution at all. The concept developed above for the case of time-resolution may be easily extended to resolution in other parameters. When several signal replicas with only frequency shifts differing are overlapping the frequency resolution problem arises, where performance is affected by the correlation coefficient (2.73) similarly to the frequency estimation. Naturally, nothing urges the use of spread spectrum in this case (see Section 2.13). If both time and frequency shifts are characteristic of the superimposed signal replicas, the procedure is the time–frequency resolution and its quality is governed by the ambiguity function (2.75). As in the case of time–frequency measurement (Section 2.14), this situation appeals to the spread spectrum crucially: no other ways offer the promise of obtaining a sharp ambiguity function along any directions in the , F plane. To conclude this section, there are also numerous scenarios of space resolution where signal copies reach the receiving antenna from different directions and the task of an observer consists in separate processing of each copy. It is the antenna itself (or antennas, including the transmit one) that then plays the role of a space signal,

61

Classical reception problems and signal design

1 s(t)

s(t)

1 0 –1 0.0

0.5

1.0

1.5

–1 0.0

2.0

0

0.5

1.0

1.5

MF input 0.5

1.0

1.5

2.0

0.5

1.0

1.5

2.0

0.5

1.0

1.5

2.0

2 0

0.5

1.0 t/T

(a)

1.5

2.0

0.5

1.0 t/T

1.5

2.0

0 –2 0.0

2.0 MF output

MF input MF output

1.5

2

0

–2 0.0

1.0

0 –1 0.0

2.0

2

–2 0.0

0.5

1 s(t – τ)

s(t – τ)

1

–1 0.0

0

2 0 –2 0.0

(b)

Figure 2.27 Time-resolution problem: the plain (a) and spread spectrum (b) signals

and the ‘signal’ design is directed towards the most effective combined processing of the waveforms received by antenna elements. Many ideas from time–frequency resolution can be applied to space resolution problems.

2.16 Summary In this chapter we visited briefly the basic procedures of signal reception: detection, recognition, parameter estimation and resolution. Throughout the chapter the Gaussian background noise model was accepted, conforming to the classical problem formulation, and the goal pursued was to see whether this somewhat idealized approach appeals strongly to the spread spectrum technology. The conclusions are summarized in Table 2.1, which lists the signal parameters that affect the performance in every specific procedure, and indicates the motivation towards involving the spread spectrum when non-energy-consuming performance improvement is wanted. As the table shows, it would not be fair to say that the classical reception problems appeal much to the spread spectrum philosophy. Only the simultaneous time–frequency estimation and resolution give unequivocal momentum to its involvement. This may

62

Table 2.1

Spread Spectrum and CDMA

Role of spread spectrum signals in the classical reception problems

Problem

Performance-influencing signal parameters

Spread spectrum signals

Detection, amplitude and phase measurement

SNR (signal energy only)

Unnecessary

Binary data transmission (M ¼ 2)

SNR, correlation coefficient

Unnecessary

M-ary data transmission, M > 2

SNR, correlation coefficients of all signals

Unnecessary but sometimes attractive from an implementation standpoint

Time delay measurement, time-resolution

SNR, signal bandwidth

Frequency measurement, frequency resolution

SNR, signal duration

Unnecessary when power-limit-free, necessary otherwise Unnecessary

Time–frequency measurement, time–frequency resolution

SNR, signal bandwidth and duration

Necessary

seem very odd and lead to questioning of the grounds for the wide popularity of spread spectrum nowadays. As the following chapter shows, however, these grounds are quite solid and manifest themselves clearly whenever we base our study on a more realistic channel model than the sometimes ‘academic’ Gaussian one, or need to draw in some additional performance criteria.

Problems 2.1. Three signals s1 (t), s2 (t), s3 (t) are given in Figure 2.28. By how many times is the maximum distance in this signal set greater than the minimum one? s1(t) U T

s2(t) T/2

t t

–2U 2U

s3(t) t

Figure 2.28 Set of three signals

63

Classical reception problems and signal design

2.2. Observation y(t) at the AWGN channel output is given in Figure 2.29, and the input signals are the same as in Problem 2.1. What will the decision of the optimal receiver be? y(t) U

T/2 T

t

–U

Figure 2.29 Waveform at the channel output

2.3. A source generates data at the rate R ¼ 10 kbps. Each bit of the source data is transmitted over the AWGN channel by BPSK. Bandwidth W ¼ 10 MHz is available in principle. Is it reasonable to use signals with bandwidth W ¼ 10 MHz? 2.4. What is better for BPSK signalling over a Gaussian channel? (a) Rectangular pulses of peak power 1000 W with bandwidth 100 kHz. (b) Rectangular pulses of the same duration with peak power 900 W and bandwidth 10 MHz? 2.5. Calculate the energy losses for the pairs of signals of Figure 2.30 used for binary transmission over the AWGN channel with respect to the optimal pair.

U

U T

T

t

t

2T/3

(a)

t

–U

t

T/3

T

–U U

U

U –U

U

(b)

–U

t

t

T/3

(c)

Figure 2.30 Three signal pairs

2.6. In differential BPSK (DBPSK) a bit content is transmitted by alternation or nonalternation of the polarities of two consecutive pulses, identical polarities corresponding to zero and different polarities to one. Compare to the first approximation DBPSK and BPSK in energy consumption (based on minimum distances only) and the bandwidth occupied, transmission rates being the same. 2.7. In quadrature PSK (4-PSK or QPSK) two bits (four messages) are transmitted by four signal phases: 0, ,  /2. Is this an optimal transmission mode for two bits? If not, describe a better technique and its asymptotic coding gain against QPSK. 2.8. Is it possible to have 10 equidistant signals with correlation coefficient between any two of them equal to 1/7? What is the maximal possible number of signals with this correlation coefficient?

64

2.9.

2.10.

2.11.

2.12.

2.13.

2.14.

2.15.

2.16.

2.17.

2.18.

2.19. 2.20.

Spread Spectrum and CDMA

Calculate and sketch versus M the energy loss (in dB) of the set of M orthogonal signals as compared to the set of M optimal signals (AWGN channel). Find the asymptotic loss when M grows. Asymptotic energy gain of orthogonal coding against uncoded binary transmission for the case of M ¼ 2 messages turns to be 1/2 or 3 dB, i.e. negative, showing loss rather than gain. What does this mean physically? Asymptotic energy gain of orthogonal coding against uncoded binary transmission for the case of M ¼ 4 messages turns to be 1 (0 dB), i.e. no gain at all. Give the physical reasoning for the result. In 8-PSK M ¼ 8 messages are transmitted by identical bandpass pulses having 8 different equidistant initial phases. Is this way of transmitting 8 messages over the Gaussian channel the best possible one if no bandwidth limitation is imposed? If not, what is the energy loss of 8-PSK against the optimal set of M signals? Compare asymptotic (determined by minimum distance) efficiency of M-PSK against orthogonal coding in energy consumption (given the error probability) and bandwidth occupied. In the IS-95 mobile phone uplink blocks of 6 bits are transmitted by orthogonal signals. The transmission rate is 28.8 kbps. Estimate the bandwidth occupied by the encoded signals (ignoring further spreading by the long code). In a digital communication system the allowed bandwidth W ¼ 1:2288 MHz. What maximal number of orthogonal signals M may be used for data transmission at the rate of 38.4 kbps? In a system data is transmitted over the Gaussian channel at the rate of 10 kbps. The system designer tries to provide 6 dB energy gain against the uncoded transmission. Is this achievable on the basis of orthogonal signals if only bandwidth within 320 kHz is tolerable? Some system is allowed to use bandwidth of 10.24 MHz while the necessary transmission rate is 100 kbps. What potential asymptotic coding gain is achievable in the system? It is necessary to transmit data over the Gaussian channel at the rate of 100 kbps using carrier frequency 2 GHz. Is it realistic to count on energy gain G ¼ 10 dB on the basis of orthogonal signals? Build up the Hadamard matrix of size 16. Which of the following transformations preserve/violate the main property (orthogonality of rows) of a Hadamard matrix? (a) Permutation of rows. (b) Permutation of columns. (c) Simultaneous alternation of signs of all elements. (d) Alternation of signs of all elements of several rows. (e) Alternation of signs of all elements of several columns. (f) Alternation of sign of upper leftmost element only.

m 2.21. Hadamard matrix   HM of size M ¼ 2 is built up by the Sylvester rule starting with 1 1 . The first column of HM is discarded and the rows of the matrix H2 ¼ 1 1 thus obtained are used to generate signals for M-ary transmission. What sort of

65

Classical reception problems and signal design

signal ensemble do we have this way? What is the bandwidth they occupy in comparison with orthogonal ones? 2.22. LFM signal (with linear frequency modulation): 8 " > > < A cos 2f0 t þ Wd ðt T sðtÞ ¼ > > : 0; jt j > T=2

Þ2

#

þ  ; jt

j  T=2

has amplitude A, carrier frequency f0 , frequency deviation Wd , duration T, time delay and initial phase ’. Classify these six parameters as energy or non-energy ones. (For any bandpass signal f0 T  1, W  f0 .) 2.23. Non-energy signal parameter needs to be measured. The correlation coefficient ( ) of the signal copies detuned in is shown in Figure 2.31 for three different cases. In which of these will the accuracy of measuring be highest? ρ(λ)

ρ(λ)

ρ(λ)

λ

(a)

λ

(b)

λ

(c)

Figure 2.31 Dependence of correlation coefficient on a measured parameter

2.24. Two non-energy scalar parameters 1 , 2 need to be measured simultaneously. The correlation coefficient of two signal copies with different pairs of values of

1 , 2 is ( 1 , 2 ) and geometrically is represented by some surface in threedimensional space. A cross-section of this surface by a horizontal plane at some level (e.g. 0.5) is given in Figure 2.32 for three typical cases. In which of these will the accuracy of simultaneous estimation of 1 , 2 be highest if no a priori knowledge about their values is available?

λ2

λ2

λ1

(a)

λ2

λ1

λ1

(b)

(c)

Figure 2.32 Horizontal sections of the surface ( 1 , 2 )

66

Spread Spectrum and CDMA

2.25. Amplitude A of the signal s(t; A) ¼ As(t) needs to be measured. The reference signal s(t) for three cases is given in Figure 2.33. In which of these cases will the accuracy of measuring A be highest?

U

s(t)

U

s(t)

s(t) U/ 2 T/2

–T/2

0 T/2

t

–T

0

T t

–T

0

T

t

–U

(a)

(b)

(c)

Figure 2.33 Three forms of a reference signal

2.26. Amplitude A of the signal s(t; A) ¼ As(t) is measured. Someone is dissatisfied with the accuracy of the amplitude estimation. How many times should the duration of the reference signal s(t) be increased in order to halve the standard deviation of the estimation of A, all the other parameters of s(t) remaining the same? 2.27. Amplitude A of the signal s(t; A) ¼ As(t) is measured. The amplitude of the reference signal s(t) is doubled while its duration is halved. What happens to the standard deviation of the estimation of A? 2.28. The initial phase of the bandpass signal needs to be measured. What happens to the standard deviation of the phase estimation when: (a) (b) (c) (d)

Carrier frequency of the signal is doubled? Signal duration is doubled? Signal amplitude is halved? Signal amplitude is doubled and duration is reduced by four times?

2.29. The initial phase of the bandpass signal needs to be measured. Three variants of the signal envelope are given in Figure 2.33. In which of these cases will the accuracy of phase measurement be highest? 2.30. The initial phase ’ of the LFM signal of Problem 2.22 is measured. Variation of which of the parameters A, f0 , Wd , T, and in which direction will affect the precision of the phase estimation? What happens to thepstandard deviation of ffiffiffi the phase estimation when A, f0 , Wd are all increased by 2 times while T and are halved? 2.31. Sketch the autocorrelation functions of the three signals shown in Figure 2.34. 2.32. The bandpass BPSK signal consists of three consecutive rectangular pulses each being of duration D. The phases of the first two equal zero while the third phase is . Sketch the autocorrelation function of the signal. 2.33. The matched filter for a rectangular baseband pulse of duration D is given. What sort of circuitry should be added to it in order to obtain the matched filter for the signals of Figure 2.34? Sketch the response of the filter matched to signal (c) when this very signal inputs the filter.

67

Classical reception problems and signal design

s(t)

s(t)

U

s(t) U

U

0

–∆



t

0

∆ 2∆

3∆

t



0

2∆

–U

–U

(a)

4∆ t

–U

(b) Figure 2.34

3∆

(c)

Three forms of a signal

2.34. The matched filter for a rectangular bandpass pulse of duration D is given. What circuitry added to it will produce a matched filter for the signal of Problem 2.32? Sketch the response of the matched filter to the signal of Problem 2.32. 2.35. The autocorrelation functions of three alternative signals are given in Figure 2.35. Which of these is best for measuring time delay?

(a)

ρ(τ)

ρ(τ)

τ

(b) ρ(τ)

τ

(c) τ

Figure 2.35 Examples of autocorrelation function

2.36. Parameters of the plain pulse signal provide standard deviationpofffiffiffiffiffiffiffiffiffiffiffiffiffi time-delay ffi measurement 0:5 ms and SNR at the matched filter output q ¼ 2E/N0 ¼ 10. Estimate roughly the signal duration. 2.37. In some radar a plain pulse signal is used. The system designer wants to reduce the peak-power by 100 times without sacrificing SNR and at the same time to reduce by 10 times the standard deviation of measuring time delay. What should the time–frequency product of the signal in the improved radar be? 2.38. In some radar distance is measured through emitting LFM pulse (see Problem 2.22) with time–frequency product WT ¼ 103 . Due to a breakage of the modulator the radar started emitting unmodulated pulses of the same peak-power and duration. What happens to the standard deviation of distance measuring? 2.39. In some system it is necessary to reduce by 10 times the standard deviation of frequency measurement. The signal power can be increased only 25/16 times (1.94 dB). How should the signal duration be changed?

68

Spread Spectrum and CDMA

2.40. In some system signal duration was quadrupled, signal power remaining unchanged. What happens to the standard deviation of the frequency estimation? 2.41. Horizontal sections of the ambiguity function for four signals are given in Figure 2.36, all sizes marked by the same symbols ( c1 etc.) being equal. Which of the signals is best for: (a) Measuring only time delay? (b) Measuring only frequency shift? (c) Measuring both time delay and frequency shift? F

F

τc1

Fe2

Fe1

τ

τ

τc1

F

Fe1

F

τ

Fe1

τ

Fe2 τc2

(a)

τc2

τc2

(b)

(c)

(d)

Figure 2.36 Horizontal sections of the ambiguity function

2.42. In the course of modernizing some system operating originally with a plain signal, emitted power was reduced by 6 dB. At the same time signal duration was increased by four times and the plain signal was replaced by a spread spectrum one with time frequency product WT ¼ 100. What happens to the standard deviations of time delay and frequency estimations as compared to the initial ones? 2.43. Which of the signals having the ambiguity diagrams of Figure 2.36 is best for: (a) Time resolution? (b) Frequency resolution? (c) Time–frequency resolution? 2.44. Horizontal sections of the ambiguity function for four signals are given in Figure 2.37, all sizes marked by identical symbols being equal. Which of the signals is best for: (a) Time resolution? (b) Frequency resolution? (c) Time–frequency resolution?

Matlab-based problems 2.45. Write a program illustrating the receiver decision on which of two competitive signals is received. Do the following:

69

Classical reception problems and signal design

F

F Fe

Fe τ

τ

τc

τc

(a)

(b) F

F Fe

Fe τ

τ τc

τc

(c)

(d)

Figure 2.37 Horizontal sections of the ambiguity function

(a) Form and plot two 100-dimensional antipodal signal vectors with elements f1g. (b) Choose one of them as a transmitted signal. (c) Form the 1000  100 matrix of Gaussian noise, putting standard deviation  6–10 times higher than the square root of the signal energy. (d) Form the 1000  100 observation matrix, each row being the sum of signal of point (b) and noise; plot observations. (e) For every observation calculate two distances (or another sufficient statistic) from the observation to each of the two signals. (f) For every observation take the minimum-distance decision. (g) Compare the decision with a preset signal of point (b) for each observation. (h) Calculate the number of errors in all 1000 observations. (i) Retaining the signal vector lengths and noise deviation, change the signals into an orthogonal pair and run the program again. (j) Do the same as in (i) for the pair of signals with positive correlation coefficient and for the pair with the second signal equal to zero. (k) Compare the results of items (i)–(k), both with each other and with theoretical predictions, and give your comments. 2.46. Write a program calculating and plotting binary transmission error probability versus SNR for an arbitrary pair of signals preset as vectors. Use power SNR defined for average energy of the signals: q2 ¼

E1 þ E2 N0

70

Spread Spectrum and CDMA

E1 , E2 and N0 being the energies of the two signals and the one-sided power spectrum of AWGN. Plot all of the curves in logarithmic scale. Run the program, and compare and explain results for: (a) Signal pairs of equal energies: antipodal, with negative correlation, orthogonal, with positive correlation. (b) The pair where one of signals is zero. 2.47. Write a program calculating and plotting (in logarithmic scale) curves of the message recognition error probabilities versus SNR per bit (see Figure 2.9) when m-bit messages are transmitted over an AWGN channel, including for each value of m: (a) The accurate error probability for bit-by-bit uncoded transmission of M ¼ 2m messages. (b) The accurate error probability for transmission of M ¼ 2m messages by the orthogonal signals. (c) The union bound on the error probability for transmission of M ¼ 2m messages by the orthogonal signals. Run the program for m ¼ 1 to 10 and interpret the behaviour of the curves. Explain why for m ¼ 1, 2 the uncoded transmission curves go lower than the orthogonal signalling ones. For m ¼ 3 to 10, find the values of the orthogonal coding gain corresponding to the error probabilities 10 3 , 10 5 and compare them with the asymptotic ones. 2.48. Write a program demonstrating experimentally energy gain of orthogonal coding as compared to uncoded transmission of a 6-bit message. The following operations are relevant: (a) Form and plot an uncoded 6-bit pattern corresponding to BPSK mode oversampled with Ns samples per bit (it is advisable to take Ns ¼ 64, i.e. 384 samples over 6 bits). (b) Form the 1000  6Ns matrix of the Gaussian noise samples with standard deviation equal to a quadrupled bit amplitude. (c) Form and plot the 1000  6Ns matrix of observations, adding the signal to the noise matrix. (d) Demodulate all observations, calculate and output the message-wise error rate. (e) Form the Hadamard matrix of order 64, take one of its rows as an encoded message and oversample it into the signal vector of dimension 6Ns . (f) Repeat items (b)–(d). (g) Compare and treat the error rates for the two explored transmission modes. (h) Run the program for the range of SNR, changing the noise level; record the results and compare them with theoretical ones (see Figure 2.9). 2.49. Write a program demonstrating experimentally the trade-off between energy gain and spectral efficiency of the orthogonal signalling. The following operations are relevant: (a) Set the number of bits m ¼ 8.

Classical reception problems and signal design

71

(b) Form all possible 2m ¼ 256 bit patterns and oversample them so that each bit occupies 160 samples. (c) Calculate the power spectra of all bit patterns and the average power spectrum under uncoded transmission. (d) Form the Hadamard matrix of order 256 and oversample it to come to the same dimension of signal vectors as previously. (e) Calculate the power spectra of all 256 orthogonal signals and the average power spectrum under orthogonal signalling. (f) Plot the average power spectra, estimate and compare the bandwidths occupied for both investigated cases and compare their ratio to the theoretical prediction. 2.50. Write and run a program illustrating optimal measurement of the amplitude of the triangle pulse of duration T: s(t; A) ¼ As(t) ¼ At T , 0  t  T (see Figure 2.38). The following steps should be fulfilled:

Figure 2.38 Simulation of measuring amplitude

(a) Specify the value of amplitude A on your own and form a signal vector of dimension around 100. (b) Form 10 vectors of the Gaussian noise n(t) with standard deviation approximately equal to the preset signal amplitude. (c) Form 10 vectors of the observation y(t) by adding noise vectors to the signal vector.

72

Spread Spectrum and CDMA

(d) Plot waveforms of the observations. Is the signal clearly visible in them? (e) Calculate and plot the curves of the decision statistics (distances or squared distances or differences Az A2 E/2) for all 10 observations versus amplitude estimation. (f) Find optimal estimations of A for all 10 observations. (g) Calculate average and variance of the optimal estimations over all observations. (h) Run the program with several preset values of A and compare the results of measuring with the preset values. Give a theoretical explanation for the results. 2.51. Write and run a program illustrating the optimal measurement of time delay of the bell-shaped baseband pulse of duration T (by the level 0.01). Assume 2 [0, 9T]. The following steps illustrated by Figure 2.39 should be completed:

Figure 2.39 Simulation of measuring time delay

(a) Use around 1000 sample points over the whole observation interval 2 [0,10T]. Preset the value of (in number of sampling points) on your own and form the time-shifted signal vector; (b) Form 100 vectors of Gaussian noise n(t) with standard deviation within the range 1 to 2 times the signal amplitude. (c) Form 100 observation vectors y(t) by adding noise vectors to the signal vector. (d) Plot waveforms of the observations (see Figure 2.39). Is the signal clearly visible in them?

Classical reception problems and signal design

73

(e) Calculate and plot curves of the correlations between observations and timeshifted signal copies versus time shift. Is the signal effect now more visible? (f) Find optimal estimations of for all 100 observations. (g) Calculate the average and the variance of optimal estimations over all observations. (h) Run the program with several preset values of and in the range of SNR. Compare the results of measurements with the preset values. Give a theoretical explanation for the results. 2.52. The bandpass rectangular pulse of duration T is applied to a bandpass filter with rectangular pulse response of duration 2T, which is frequency-detuned against the signal by F. Based on the complex envelope, calculate and plot signal shapes (real envelopes) at the filter output for F ¼ a/T, where a ¼ 0, 0:5, 1:0. 2.53. The bandpass rectangular pulse of duration T and carrier frequency f0 ¼ 10/T is applied to the bandpass filter with rectangular pulse response of the same duration which is frequency-detuned against the signal by F 2 f0, T1 , T2 g. Based on the complex envelope, calculate and plot the bandpass signals at the filter output for all three values of F. 2.54. Write a program calculating and plotting the autocorrelation function of both baseband and bandpass signals of the same arbitrary form and duration T. Take the carrier frequency of the baseband signal equal to 10/T. See the example in Figure 2.40. Run the program for: (a) Rectangular pulse. (b) Triangular symmetric pulse.

Figure 2.40 Autocorrelation functions of baseband and bandpass signals

74

Spread Spectrum and CDMA

(c) Triangular pulse rising within [0, T). (d) Pulse of your own choice. 2.55. Write a program demonstrating the time-compression effect in a matched filter. Take a rectangular linearly-frequency-modulated (LFM) signal of duration T with complex envelope: 8   2 > < exp j Wd t ; 0  t  T T S_ ðtÞ ¼ > : 0; t < 0 or t > T

Take the initial carrier frequency f0 ¼ 50/T and five values of frequency deviation Wd ¼ a/T, a 2 f0, 10, 20, 30, 40g. For each value of deviation show bandpass signals at the matched filter input and output. 2.56. Write a program illustrating the dependence of the accuracy of time-delay estimation on the signal bandwidth (see Figure 2.21). Take an LFM signal with the bellshaped envelope, i.e. the complex envelope: 8 "    2 # > Wd t2 > < exp 20 t 1 exp j ; 0tT T 2 T S_ ðtÞ ¼ > > : 0; t < 0 or t > T Perform calculation and plotting for the values of the deviation Wd ¼ a/T, a ¼ 0, 10, 25, 50. The following steps should be completed:

(a) Specify the value of the deviation Wd and form the signal (complex envelope) vector of dimension around 100. (b) Plot the real envelope of the signal. (c) Form 100 vectors of the complex Gaussian noise with standard deviations of real and imaginary parts within [0.5, 4.0]. (d) Form 100 observation vectors by adding noise vectors to the signal vector. (e) Plot waveforms of the real envelopes of the observations. Is the signal clearly visible in them? (f) Calculate and plot curves of the matched filter output real envelopes for all 100 observations. (g) Find the time positions of the maximums of matched filter output real envelope for all 100 observations. (h) Calculate the average and the variance of the time-delay estimations over all 100 observations. (i) Compare data for different Wd and treat the results theoretically. 2.57. Write a program demonstrating resolution of two time-shifted bandpass rectangular pulses of duration T. Take the signal of Problem 2.55 with the same values of carrier frequency and deviation (Figure 2.27). Recommended steps: (a) Specify the value of the deviation Wd and form the signal (complex envelope) vector of necessary dimension.

Classical reception problems and signal design

75

(b) Form and plot a bandpass signal. (c) Specify the value of delay 0 < < T, form and plot a delayed signal copy. (d) Calculate and plot superposition of the two signals. (e) Calculate and plot matched filter response to it. (f) Run the program, varying the frequency deviation and delay, and give a theoretical treatment of the results. 2.58. Write a program calculating and plotting the time–frequency ambiguity function of a plain bandpass pulse with arbitrary real envelope and duration T. Provide for plotting also the basic sections of the ambiguity function (along the and F axes) as well as the horizontal section at the level 0.5. Run the program for:

Figure 2.41

(a) (b) (c) (d)

Ambiguity function of a rectangular pulse

Rectangular pulse (see Figure 2.41). Triangular symmetric pulse. Triangular pulse rising within [0,T). Pulse of your own choice.

3 Merits of spread spectrum 3.1 Jamming immunity The surrounding environment in which a specific system transmits and retrieves information is not perfectly friendly towards it. Along with thermal noise, interferences of varying physical nature may accompany the useful signal at the receiver input. In particular, interference can emerge as a result of the presence of some other system on the air if its operating frequency is close enough to that of the first system. Following the universally adopted terminology, we will call this sort of interference a jammer. A great variety of jammer types may be encountered in practice and special measures are as a rule necessary to counter their destructive effect. In this section we will show that the spread spectrum is quite a powerful instrument of jammer neutralization. An exhaustive investigation into system behaviour subject to the combined effects of both jammer and thermal noise would require the calculation of integral performance characteristics such as error probability or estimate precision. The concrete results of this challenging work may be found in books (e.g. [5,6]) and mainly in numerous specialized papers (see, for example, the bibliography in [3]). However, our aim is much more modest and directed at getting a general idea of why and how spread spectrum helps in combating a jammer. For this reason we limit ourselves to only the simplest assessments based on the power ratio between the signal and overall interference. Putting it another way, we choose for the analysis here only the plainest, but still very characteristic, type of jammer, which is approximated by the Gaussian random process whose spectrum overlaps with that of the signal. Sometimes such a simplified approach is fully adequate, as it is in the case of BPSK or ASK data transmission, where the error probability depends only on the ratio referred to above, whenever the overall interference may be assumed Gaussian. Other situations (M-ary transmission, parameter measuring) are not that straightforward and the power ratio does not contain all the necessary information on the performance quality, but still remains indicative as a ‘rule of thumb’ to judge the potential advantages of spread spectrum. We consider two basic models of a jammer, starting with a narrowband one.

Spread Spectrum and CDMA: Principles and Applications Ó 2005 John Wiley & Sons, Ltd

Valery P. Ipatov

78

Spread Spectrum and CDMA

3.1.1 Narrowband jammer This type of jammer is more typical of situations where some side system or systems have no hostile intentions with respect to the useful system and create a jammer just as a result of normal functioning. Figure 3.1 shows the amplitude spectrum j~s( f ) j of the useful signal and the jammer power spectrum J~( f ) approximated by rectangles against the uniform background AWGN power spectrum N0 /2. We call a jammer narrowband only to stress that its bandwidth Wj is smaller than the signal bandwidth W and there are areas where the signal spectrum is not corrupted by the jammer. The narrowband jammer may be further classified to partial-band, tone, etc. [3,5,6]; however, for our study the specific value of its bandwidth is immaterial. First suppose that the useful system undertakes no special measures to combat a jammer except for, maybe, just appropriate signal design. This kind of scenario means that a system designer may foresee the risk of the presence of a jammer and allow for it in the signal choice, but the system is not adaptive, and makes no adjustment of either signal modulation or processing algorithm to the current interference environment. In other words, it uses always only the filter, which is matched to AWGN regardless of the presence or absence of a jammer at the receiver input. To find the power signal-to-interference ratio (SIR) q2I at the matched filter output note that with a rectangular signal spectrum (where js~( f ) j equals the constant ~s within signal bandwidth W and is zero elsewhere), the filter amplitude transfer function is also uniform within the signal bandwidth W and zero outside it. Without loss of generality we can put its non-zero level equal to 1. Therefore the filter passes a jammer (treated as a random process) to the output without any change of its power J, the filtered AWGN power being N0 W. On the other hand, the filter is matched to the R 1signal and sums all signal harmonics coherently to produce the output peak Aout ¼ 1 j~s( f ) j df ¼ 2W~ s, where spectrum uniformity within the bandwidth W is used and doubling is responsible for ‘negative frequencies’. signal energy calculated through the R 1 By the2 same token s2 . Consequently: s( f ) j dt ¼ 2W~ Parseval theorem E ¼ 1 j ~ q2I ¼

A2out 4W 2 s~2 2E ¼ ¼ J þ N0 W J þ N0 W N0 þ J=W

~ J( f ) ~ s( f ) N0 /2 f W Wj

Figure 3.1

Spectra of signal, jammer and background AWGN

ð3:1Þ

79

Merits of spread spectrum

From the last equality it can be seen that, regardless of a specific jammer bandwidth Wj , the matched filter output SIR behaves as if the jammer power were uniformly spread over the signal (not jammer!) bandwidth W, creating an additional ‘AWGN’ with the power spectrum J/W. Let us turn to the other scenario where the useful system adapts its receiver to the current interference pattern. The optimal processing procedure would be filtering matched to the overall interference, including a narrowband jammer. It is obvious physically that when a jammer is very strong against the background AWGN such processing is equivalent to a full cutting off of the frequency band damaged by the jammer. Figure 3.2 shows spectra at the band-elimination filter output. No jammer is present there but the signal frequency components within the jammer bandwidth are also forced to zero as well as the noise components. The spectral pattern may be treated as though the signal originally occupied only the part of bandwidth W free of the jammer, having the energy E(1 Wj /W). Accordingly, the matched filter clearing this residual signal off the AWGN will provide output power SNR (the subscript J stands for jammer): q2J ¼

2Eð1

Wj =WÞ ¼ q2 ð1 N0

Wj =WÞ

ð3:2Þ

with q2 ¼ 2E/N0 being a ‘pure’ matched filter power SNR in the absence of jammer.1 Analysing equations (3.1) and (3.2) we note that they both clearly point to the benefits of wideband signals for the anti-jamming capability: the wider the signal bandwidth W versus the jammer bandwidth Wj , the smaller is the additional power spectrum in the first case and the energy loss in the second (jammer power J constant), and the greater are q2I and q2J . But when the signal peak power P is limited and not allowed to increase, widening the bandwidth cannot be realized by a trivial signal

~s( f )

N0 /2 f W Wj

Figure 3.2 Spectral pattern after the band-elimination filtering

1

We again stress that the SNR is not a universal characteristic of performance. It is appropriate for BPSK or ASK data transmission but in the general case band elimination affects the correlation properties of signals along with their energies. E.g. orthogonal signals may lose orthogonality under cutting off partial bandwidth. More detailed analysis is necessary to allow for this sort of effect.

80

Spread Spectrum and CDMA

shortening, since otherwise signal energy, SIR and SNR will suffer. Thus, we arrive at the following conclusion: to achieve a higher narrowband jamming immunity with no mobilization of brute-force resource (increase of signal energy or peak power) the only way is to widen the spectrum independently of signal duration, i.e. to use spread spectrum technology.

3.1.2 Barrage jammer In many military scenarios and intelligence games, a jammer is frequently created deliberately as an electronic countermeasure. In such cases the jammer transmitter may suspect that the system under counteraction will appear smart enough to register the presence of the jammer and properly adapt itself to it. In particular, when the jammer is narrowband the system can resort to band-elimination filtering or even to changing a signal to shift its spectrum to the jammer-free zones. To prevent this, the barrage noise jammer can be engaged whose power spectrum covers the signal spectrum with no gaps (Figure 3.3). It is clear that the barrage jammer corrupts the signal in the same way as an additional AWGN with power spectrum density NJ ¼ J/W. Therefore, the power SNR at the matched filter output of the useful system: q2J ¼

2E 2E ¼ N0 þ NJ N0 þ J=W

coincides with SIR (3.1). In this case, however, the malignant intent urges the jammer transmitter to provide a much more damaging effect compared to the natural AWGN. It is possible only if J/W  N0 , resulting in: q2J 

2EW 2PðWTÞ ¼ J J

ð3:3Þ

We again clearly see that when the peak power of the useful system is limited, and so is the power resource of the jammer transmitter, the involvement of signals with high time–frequency product WT, i.e. spread spectrum ones, is the only instrument at the disposal of the system to improve its immunity towards the barrage jammer. Formula (3.3) explains another popular name for the time–frequency product WT. As is seen, the ratio between the signal power and the power of a uniform-spectrum noise ~ J( f )

~s( f )

N0/2 f Wj = W

Figure 3.3

Spectra of signal, barrage jammer and background AWGN

81

Merits of spread spectrum

within the signal bandwidth increases at the matched filter output 2WT times against the input value P/J. Thus, it is natural to call WT the processing gain. The conclusions above are well supported visually by two figures, obtained by simulation in Matlab. Figure 3.4 illustrates matched filtering of the plain rectangular signal (column a) and a spread spectrum signal (LFM, WT  50) of the same duration and energy (column b). The same jamming CW interference is added to both signals (second row). While the plain signal is fully masked by the jammer and is not clearly seen at the filter output, the spread spectrum one, time-compressed by the matched filter, is observable distinctively. In Figure 3.5, where the columns correspond to the same two signals, the upper plots show the signal power spectra. The plots of the second row give the power spectra of two random realizations of different barrage jammers, the same fixed average jammer power being distributed over the signal bandwidth. Because of this the average level of the spectrum in column (b) is about 50 times lower than that in column (a). The third row shows example observed waveforms, where the intensity of the jammer is approximately the same for both signals, which are well hidden under the jammer. As for the lower plots, they again confirm explicitly the superiority of a spread spectrum signal in resistance to a barrage jammer. In closing, note once again that this section is in no way aimed to answer questions on what sort of jammer is most dangerous in a concrete scenario and what the system should

1 Signal

Signal

1 0 –1 0.0

–1 0.5

1.0

1.5

2.0

0.0

Signal + jam

Signal + jam

0

0.5

1.0

1.5

1.5

2.0

0.5

1.0

1.5

2.0

0.5

1.0

1.5

2.0

1 MF output

MF output

1.0

0

–5 0.0

2.0

1 0 –1 0.0

0.5

5

5

–5 0.0

0

0 –1

0.5

1.0

1.5

2.0

0.0

t/T

t/T

(a)

(b)

Figure 3.4

Examples of matched filtered jammer and signal

Spread Spectrum and CDMA

Signal spectrum

40 20 0 0

20

40

60

80

80 60 40 20 0

fT 0

20

40

60

Jam spectrum

Jam spectrum

Signal spectrum

82

80 Observation

Observation

0.0

0

20

40

60

80

8 6 4 2

fT 0

20

40

60

80

0

0.5

1.0

1.5

2.0

5

0

0

0.5

1.0

1.5

0

–5

2.0

1 MF output

1 MF output

0.5

0

5

–5

1.0

0 –1

0 fT

–1 0

0.5

1.0

1.5

t/T

Figure 3.5

2.0

0

0.5

1.0

1.5

2.0

t/T

Clearing a signal off a barrage jammer

do to optimize its performance in more complicated situations than those considered. The idea was just to demonstrate the principal advantages of spread spectrum in countering a jammer. An interested reader may consult numerous specific works on the issue and confirm that whatever sophisticated systems and strategies are investigated, the general tendency is always the same: spread spectrum raises the jamming immunity potential.

3.2 Low probability of detection It had been already pointed out that the potential of spread spectrum was first recognized by designers of military and intelligence systems and, as shown in Section 3.1, one reason for this is the high anti-jamming resistance of spread spectrum signals. The other reason we will discuss in this section. In the confrontation of electronic systems effective jamming may be organized only after detecting the presence of an adversary system on the air and estimation of its parameters, such as carrier frequency and bandwidth. This entails a very popular scenario of the confrontation of two systems, when the first (call it intended) tries to operate as covertly as possible and escape unintended detection of its signal, while the

83

Merits of spread spectrum

second (interceptor or eavesdropper) is on the alert constantly, doing all in its power to discover an active state of the first. From the perspective of the intended system, let us explore how the spread spectrum can help in its conflict with an interceptor. There are lots of strategies and techniques, which may be hypothesized to be at the interceptor’s disposal potentially. They may be rather sophisticated and hard to analyse (see [6,9] and their bibliographies). We are again pursuing the goal of getting the general idea of why a spread spectrum appears to be a good option in this case. Let us assume that the intended system uses a signal with some non-trivial modulation law, details of which are not known to the interceptor, depriving the latter of the chance to use a matched filter or a correlator for signal detection. It is natural to believe, then, that the eavesdropper has no other choice but to treat the intercepted signal as random and base its detection on just the presence or absence of some extra energy in the suspicious frequency band. Thus, an energy detector, also called a radiometer, which is optimal for detecting a band-limited noise signal against the AWGN background, is accepted as the operational instrument at the intercepting side. Figure 3.6 gives the structure of an energy detector. A bandpass filter, whose bandwidth Wi spans the whole signal spectrum or only part of it, filters the observation to remove any off-band noise. Then a square-law amplitude detector forms an estimate of instant power, which is further integrated to produce an estimate of energy E^ within an observation interval Tob . The energy estimate is then compared with the threshold Et , and inequality E^  Et entails the decision that the observation contains a signal along with the ‘natural’ background noise, while in the opposite case no signal presence is declared. In practice, an interceptor may not know beforehand the frequency zone and time interval occupied by a signal. In such circumstances he tries various combinations of these parameters, implementing the whole procedure with the aid of either scanning the time–frequency area or a bank of parallel channels, each analysing its specific time–frequency zone. In any case the performance of the interceptor receiver will depend radically on the performance of the energy detector tuned to the true signal time– frequency zone. This allows us to idealize an interceptor’s prior knowledge and believe that he is well aware of where on the time–frequency plane the signal energy may manifest itself. As long as observation outside the signal duration carries no information about the signal presence we may put Tob ¼ T, as is done in Figure 3.6. Figure 3.7 shows a rectangular approximation of the signal spectrum along with the uniform natural background AWGN power spectrum (a) and the amplitude–frequency transfer function of the radiometer bandpass filter (b). From the interceptor’s viewpoint, an indication of the signal presence is an extra (signal) power spectrum density Ns /2 ¼ P/2W added to that of the background thermal noise N0 /2. The radiometer bandpass filter has on its output the noise process with power 2n ¼ N0 Wi in the absence of the signal and 2n þ 2s ¼ (Ns þ N0 )Wi ¼ (P/W þ N0 )Wi in its presence.

y(t)

Bandpass filter

Envelope detector

ud

T 0



Comparator Et

Figure 3.6

Energy detector (radiometer)

Hˆ1 Hˆ0

84

Spread Spectrum and CDMA

Ns /2

(a)

N0 /2 f W

(b)

f

wi Figure 3.7

Spectra at the radiometer input and the bandpass filter bandwidth

Let us find the mean and variance at the envelope detector output. First of all, an output voltage ud of the square-law detector equals the input instant power. Therefore, expectation ud of ud in the absence of a signal is simply the average power of the filtered noise ud0 ¼ 2n , while when the signal is present it goes up to ud1 ¼ 2n þ 2s . It is exactly the increment of ud caused by the signal: Dud ¼ ud1

ud0 ¼ 2s ¼ Ns Wi ¼ PWi =W

ð3:4Þ

which allows the interceptor to hope to detect the presence of a signal. On the other hand, this useful (from the interceptor’s viewpoint) effect is masked by the random fluctuations of ud , measured by its variance varfud g. The latter can be found if it is remembered that the instant power of a bandpass process is its instant envelope Y squared and halved, and thus ud ¼ Y 2 /2, meaning that varfud g ¼ varfY 2 g/4. Variance of any random variable may be calculated as the mean square minus the mean squared [1,13,14]: varfY 2 g ¼ Y 4

Y2

2

ð3:5Þ

Now make use of the fact that the envelope Y of a Gaussian bandpass random process with variance 2 has Rayleigh PDF [1]: 8   Y2 > < Y exp ;Y  0 2 22 WðYÞ ¼ > : 0; Y < 0

and its even-order moments are found via elementary integration [13]:

Y 2n

¼

Z1 0

 n Y WðYÞ dY ¼ 22 2n

Z1 

Y2 22

0

n

exp



  2  n Y2 Y d ¼ n! 22 2 2 2 2

85

Merits of spread spectrum

Substituting this into (3.5) gives varfY 2 g ¼ 84 44 ¼ 44 . When the signal is not present at the interceptor receiver input we should use in this expression 2 ¼ 2n . Strictly speaking, with the signal advent the filtered observation may differ from a Gaussian process, making applicability of the result just obtained doubtful. This detail, however, has no importance to the case in question, since the intended system does its best to hide its signal under the thermal noise and we have every reason to assume that a signal has a negligible effect on the variance of instant power and thus on the variance of the detector response. Therefore, independently of signal presence, variance of ud can be assumed the same: varfud g ¼ varfY 2 g=4 ¼ 4n ¼ ðN0 Wi Þ2

ð3:6Þ

In order to estimate the mean ud and register its growth due to a signal presence, the integrator in the scheme of Figure 3.6 runs time averaging of the detector response over the observation period T. To make a constant component at the detector output distinctive enough against the random fluctuations the latter should be smoothed as a result of integration. This is possible only if fluctuations of the detector response around ud are sufficiently fast and change their polarity many times during the period T to compensate each other and produce an averaging effect. In other words, the number of statistically independent samples ns of the detector response within T should be large enough. Extension in time (correlation spread c ) of the autocorrelation function of a random process is a trustworthy first approximation of a minimal time interval between samples, starting with which samples may be treated as independent. Since the filtered observation has the bandpass Wi its correlation spread is estimated as c  1/Wi , which gives the number of independent samples ns  Wi T. Although practically integration may be implemented as continuous, its result is rather close to that of just summation of ns independent samples [6,9], which is even a more practicable technique, especially in digital circuitry. To perform an accurate analysis, the PDF of the integrator output value E^ should be found for both hypotheses (signal absence and presence) and then integrated over the decision regions to obtain two probabilities, of false alarm and detection. These PDFs are subject to the chi-square law, which is a bit bulky and not quite transparent enough for a physical treatment. However, we may again exploit the fact that a signal is weak and its reliable detection requires a large number of integrated samples ns . Then the central limit theorem allows assuming Gaussian PDF for the integrator output E^, therefore finding the mean and variance of E^ is enough to accomplish calculation of the probabilities just mentioned. When only AWGN is observed the mean and variance of E^ are E^ ¼ ns ud0 , varfE^g ¼ ns varfud g ¼ ns 4n , where the second result follows from (3.6) and statistical independence of the integrated samples. Similarly, when AWGN plus signal is observed, E^ ¼ ns ud1 but the variance remains unchanged because of signal weakness. Thus PDF at the integrator output corresponding to the hypotheses H0 (signal absence) and H1 (signal presence) are: " # 1 ðE^ ns udi Þ2 ^ ; i ¼ 0; 1 WðE jHi Þ ¼ pffiffiffiffiffiffiffiffiffiffi 2 exp 2ns 4n 2ns n

86

Spread Spectrum and CDMA

When E^ exceeds the threshold Et the false alarm happens if a signal is actually absent and detection if a signal does arrive at the receiver. Hence, the probabilities pf , pd of these events are respectively: pf ¼ PðE^  Et jH0 Þ ¼

Z1

  Et ns ud0 ^ ^ WðE jH0 ÞdE ¼ Q pffiffiffiffi 2 ns  n

Z1

  Et ns ud1 ^ ^ WðE jH1 ÞdE ¼ Q pffiffiffiffi 2 ns  n

Et

and pd ¼ PðE^  Et jH1 Þ ¼

Et

Having rewritten the second of these equations as:  Et ns ud0 pd ¼ Q pffiffiffiffi 2 ns  n

ns ð ud1 ud0 Þ pffiffiffiffi 2 ns  n



ð3:7Þ

one may see that if a tolerable level of the false alarm probability is predetermined, the first fraction in the brackets of (3.7) is fixed and the detection probability is completely defined by the ratio: qi ¼

ns ð ud1 ud0 Þ ns Dud ¼ pffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi pffiffiffiffi 2 ns  n ns varfud g

ð3:8Þ

The physical content of the latter is obvious: it is a voltage SNR at the integrator output showing the proportion between the useful (increment of expectation due to the signal advent) and hampering (standard deviation of random fluctuations) components of E^. Making use of (3.4) and (3.6) together with the equation ns ¼ Wi T, we can represent (3.8) as: qi ¼

pffiffiffiffiffiffiffiffiffiffi P pffiffiffiffi P ns ¼ Wi T WN0 WN0

This equation allows us to see that from the interceptor’s point of view, the maximal possible filter bandwidth, i.e. equal to the signal one (Wi ¼ W), is optimal, providing the greatest output SNR: pffiffiffiffi P T q2 qi ¼ pffiffiffiffiffiffi ¼ pffiffiffiffiffiffiffiffiffi ð3:9Þ W N0 2 WT

where q2 ¼ 2E/N0 ¼ 2PT/N0 is, as always, SNR at the matched filter output of the intended receiver. Certainly, q2 should be maintained large enough otherwise the intended system will not be able to do its main job. It is quite clear, then, that the intended system has the only way to prevent detection of its signal by a potential interceptor: use a spread spectrum signal with as large a processing gain WT as possible. Coming back to Figure 3.7 uncovers the physical basis for this conclusion. Widening the spectrum of the signal of a constant energy

87

Merits of spread spectrum

and duration reduces the signal power spectrum density, hiding it under the background spectrum of the natural thermal noise. Example 3.2.1. Consider the system transmitting sporadically and rather infrequently one of 64 messages using orthogonal signals. To provide error probability no worse than 10 3 it needs to use SNR around 7 dB per one bit, or 15 dB per 6-bit message (see Figure 2.9). Thus q 2 is 15 dB and transforming the interceptor’s (voltage!) SNR (3.9) into decibels we have: ðqi ÞdB ¼ 2ðq 2 ÞdB

20 lg 2

10 lg WT

If the system employs spread spectrum signals with processing gain WT ¼ 1000 the interceptor’s SNR turns to be (qi )dB ¼ 6 dB or qi ¼ 1/2, which is not at all sufficient for reliable detection of the intended system’s presence on the air in one session. If, for instance, the interceptor tolerates a probability of false alarm of pf ¼ 10 3 then according to (3.7) the detection probability pd  5  10 3 , i.e. is extremely small and exposes no serious threat to the intended system.

Finishing this section, note that the discussed advantage of spread spectrum is widely utilized today not only by the military or special services. The fact that a spread spectrum signal may be practically unnoticeable for the equipment that monitors the state of the radio air has serious implications for licensing policy. In particular, the range of commercial systems that may actively operate on the air without applying for a licence becomes broader, and in some regions special spectral zones are currently allocated for such licence-free use.

3.3 Signal structure secrecy Continuing the line of the previous section, let us remember once more that the only reason for an interceptor to resort to such an ineffective detection instrument as an energy receiver is lack of information about the structure of the detected signal, i.e. its modulation law. As a result, the interceptor cannot process the signal in the manner used by the intended receiver (matched filtering). Of course, if the signal structure is not complicated enough and the interceptor is aware that it was chosen from only a few alternatives he may try them all. Appropriate equipment for doing so may be a bank of parallel matched filters or a single filter (several filters) reconfigured to fit the candidate signal structures serially in time, if the signal is known to be received for an adequate duration. Therefore, another aspect of the strategy of the intended system in its conflict with an interceptor consists in making a signal structure practically unbreakable. A similar task is characteristic of military or commercial systems that do not tend to make the fact of their operation a mystery, e.g. if they function continuously, but are very keen to avoid unauthorized access to services addressed only to classified consumers, or forging of the transmitted information. The satellite-based global navigation system GPS is a convincing example of this kind. It has two positioning channels (see Section 11.2): open (or clear access, abbreviated C/A) and special (or protected, P). The signal transmitted over the second channel allows super-high precision of positioning, and the US government, which runs the system, does not permit unconditional access

88

Spread Spectrum and CDMA

to this channel. In order to protect it from unauthorized use some special measures are undertaken concerning the signal modulation. In disciplines dealing with information security, the extent of data protection is measured by a number of competitive equiprobable keys, which an enemy cryptanalyst (eavesdropper) should try to crack the ciphertext, i.e. encrypted data. In application to the signal structure, each of those keys is just a modulation law, which is typically repeated with some period T. Suppose that a signal is built of chips (see the example in Section 2.7.3) on the basis of an M-ary alphabet, i.e. using M different symbols to manipulate chips. If the bandwidth allocated to the system is W then the total signal space has dimension measured as WT (ignoring bandpass doubling; see Sections 2.3–2.5), i.e. a modulation law may be thought of as being constructed of WT chips. It is clear, then, that M WT is the total number of possible modulation laws, i.e. competitive keys, and the system designer concerned with secrecy of the modulation format in the developed system should employ signals with rather large processing gain WT. Example 3.3.1. The signal of the P-channel (P-code) in GPS is binary (M ¼ 2) with the bandwidth W  10 MHz. Its structure is quite regular and repeated with the period T ¼ 7 days. Being hidden under the thermal noise, this signal cannot be retrieved by symbol-wise reception and only knowledge of its fine structure permits it to be cleared with highest efficiency off the AWGN. To prevent an unauthorized interceptor from accessing the P-code, a secret binary key (W-code) is modulo 2 added to it, masking the structure of the resulting Y-code. A single symbol of the W-code spans 20 symbols of the P-code; therefore, to break this mask by a trial and error method, up to 2WT /20 alternatives should be tested. Since WT ¼ 7  86 400  107 > 1012 , the number of tried keys is greater than 2 to the power of ten billion, which is fully beyond any imagination. For this reason the Y-code is believed to be unbreakable and no reports have emerged in nearly 10 years of its history on any successful cryptanalytical attack on it.

We conclude the section with another declaration on the advantages of spread spectrum: this technology is very conducive to cryptographic protection of a signal structure.

3.4 Electromagnetic compatibility The problem of electromagnetic compatibility (EMC) is one of the most topical in modern wireless engineering. EMC implies friendly co-existence of different systems on the air despite each of them receiving not only its proper signal but also the signals of the other systems. Certainly, it is impossible to root out entirely mutual disturbance when several systems are operating simultaneously within a relatively small area. Any active system, i.e. emitting electromagnetic waves, inevitably affects all neighbouring ones and a system designer should try to minimize this potentially harmful influence. There are two parties playing the EMC game. The first, which may be called ‘emanating’, tries to minimize the interference created by its emitted power to other nearby, so-called ‘susceptible’, systems [15]. The motivation for this is not only ethical

Merits of spread spectrum

89

but is also enforced by strict international and domestic regulations, compliance with which is carefully monitored by the services authorized to impose relevant sanctions. Any system of the second, ‘susceptible’, party takes its own measures aimed at neutralization of alien signals falling in its receiver front end. Among the traditional ways of providing EMC are stringent frequency allocation controlled by national and world institutions, employing antennas with high directivity, careful design of RF circuitry etc. Here we briefly show why spread spectrum technology may also be included in this list. From the point of view of the emanating system, the following logic is justified. As long as it is possible to make the emitted signal almost imperceptible for a special monitoring receiver (see Section 3.2) at the cost of complicating the modulation law, i.e. spreading the spectrum, such a signal will all the more be less harmful to an ordinary outside system operating in the same band. The issue is only in the choice of processing gain guaranteeing that the signal power spectral density appears to be sufficiently low compared to the natural noise spectrum intensity at the input of an outside receiver. As a rule of thumb, assume that ‘sufficiently low’ means 7 dB, i.e. Ns /N0  0:2. Substituting Ns ¼ P/W ¼ E/WT into this proportion leads to the criterion of EMC E/WTN0  0:2 or q2 /WT  0:4, where again the targeted parameter is expressed in terms of the intended receiver SNR q2 and processing gain WT. If, for instance, intended SNR at the point of an outside receiver were 20 dB, then WT  400 might be considered satisfactory in respect of the EMC problem. In a real design estimates like this have to be coordinated with distance so that some circle around the emanating system exists outside of which the signal of the latter is practically harmless for other systems [16]. From the position of a susceptible system, any outside signal at its receiver output may be treated as a narrowband or broadband jammer and all the reasoning behind the benefit of spread spectrum in anti-jamming (see Section 3.1) is applicable. Therefore we see that the spread spectrum philosophy fits well with the issue of EMC.

3.5 Propagation effects in wireless systems To explore the next merit of spread spectrum we need to collect some supplementary knowledge on wave propagation effects in wireless channels, and this section will be a sort of excursion into this area. First of all, a key parameter affecting performance in any reception problem is signal intensity or SNR. Certainly, signal energy and power in all preceding formulas expressing error probability, variance of estimate etc. characterize signal level at the receiver input. Hence, it is important to be able to predict signal intensity at some point in space remote from the transmitting antenna, allowing for effects accompanying electromagnetic wave propagation. The issue of wave propagation is quite complicated and hard to analyse theoretically. There are a great variety of factors causing both deterministic and random attenuation of a signal reaching the receiver input. Due to them the received signal is corrupted not only by additive noise (AWGN) but also by multiplicative interference, whose name stems from the fact that it changes signal intensity, or putting it another way, scales signal amplitude.

90

Spread Spectrum and CDMA

3.5.1 Free-space propagation To begin with consider an idealized free-space model (see Figure 3.8), where there are no obstacles between the transmitter and receiver antennas and the transmitted wave propagates along the single possible path, called line-of-sight (LOS). Let D denote the distance between the transmitter and the receiver. If the transmitter antenna were omnidirectional the transmitted power Pt would be uniformly distributed over the inner surface of the sphere of radius D and power Pt /4D2 would fall on every unit of area of this surface. The receiving antenna with an effective area Ar would then capture a received power Pr ¼ Pt Ar /4D2 . If the transmitting antenna is directional it emanates in the receiver direction power which is Gt higher than that of the omnidirectional one, and Gt is called a transmit antenna power gain. In this case the received power becomes Gt times higher as well. To represent the received power in a symmetrical form, we make use of the relation between Ar and a receiving antenna power gain Gr ¼ 4Ar / 2w , where w is wavelength. We will come to the Friis free-space formula [4]:  

w 2 Pr ¼ Pt Gt Gr ð3:10Þ 4D showing that the attenuation of the signal power along the LOS is inversely proportional to the squared distance. The free-space model may be directly applied to communication links whose environment is well described as an open space, e.g. between space vehicles or aircrafts, ground control centre and space vehicle etc. The propagation medium of terrestrial systems is much less favourable and in its influence on the signal intensity two main components are typically categorized: shadowing and multipath fading.

3.5.2 Shadowing Shadowing is caused by landscape details obstructing LOS: hills, forests, bushes, buildings and so forth. Due to them the signal intensity drops with distance much faster than equation (3.10) predicts. Of course, the irregular nature of terrestrial patterns makes attempts at creating some universal theoretical model of shadowing impossible or worthless. A great deal of field testing has been carried out to collect knowledge about the general character of the dependence between the received power and the length of the propagation path and a number of empirical models have been proposed [17–19]. One of the most popular with mobile communication specialists is the Okumura–Hata model, according to which the behaviour of an average received power Pr obeys the law Pr ¼ kPt /De where the specific value of the exponent e depends on the kind of landscape, typically ranging from 3 (rural area) to 5 (dense urban area) and the coefficient k is determined by the frequency band and D LOS Transmitter antenna

Receiver antenna

Figure 3.8 Free-space propagation model

91

Merits of spread spectrum

the heights of the antennas [2,6,15,19]. The received power predicted by this model gives only a very rough reference point, being the result of averaging over the different positions of the receiver with the same distance D from the transmitter. Fluctuations of Pr along the arc of radius D centred at the transmitter location are significant and approximated by the lognormal PDF, meaning that the distribution of the decibel content of the received power x ¼ 10 lg Pr is Gaussian (normal): " # 1 ðx xÞ2 WðxÞ ¼ pffiffiffiffiffiffi exp 22x 2x

The standard deviation x of 10 lg Pr in the last expression is commonly accepted in the literature to be between 6 and 12 dB. Attenuation of power caused by shadowing has a static character and, even when the receiver is in motion, usually changes in time comparatively slowly due to the large scale of landscape components (tens or hundreds of metres). For this reason shadowing is also often referred to as large-scale or long-term fading.

3.5.3 Multipath fading Let us turn now to the second factor affecting the received signal intensity: multipath propagation. As a matter of fact, the transmitted signal can reach the receiving antenna travelling by many paths. The LOS may appear as one of them or be utterly obstructed, all the other paths emerging as a result of the transmitted wave being reflected by various objects. Examples of such reflectors are buildings, towers, cars, aircrafts, the earth’s surface and many more (see Figure 3.9).

D2

D3

D4

D1 Receiver

Transmitter

Figure 3.9

Illustration of multipath propagation

92

Spread Spectrum and CDMA

Suppose that travelling by the ith path, the transmitted signal with the reference complex envelope S_ (t) assumes amplitude Ai , delay i and initial phase i . Then the received complex envelope will be found as: X S_ r ðtÞ ¼ Ai S_ ðt i Þ expðji Þ ð3:11Þ i

where without loss of generality the real amplitude of the reference signal is set equal to one. When the delay spread ds , i.e. maximal mutual delay between signals of different paths, is within the signal duration all of the multipath signals will overlap and interfere with each other. To better understand the phenomenon, consider first one simple scenario, which may take place in mobile communications, TV broadcasting or elsewhere. Example 3.5.1. Figure 3.10 describes the situation where the transmitted signal reaches the receiver through the paths created by two reflectors (buildings, vehicles etc.), the LOS path being totally blocked by an obstacle (e.g. a building) and (3.11) including only two summands. Both reflectors are oriented so that they emit the secondary wave towards each other. The receiver placed on the line connecting the reflectors will observe superposition of the two interfering waves whose phase difference  is governed by the ratio of propagation difference  ¼ D10 þ D100 D20 D200 to the wavelength w :  ¼ 2/ w . With amplitudes of the reflected signals at the receiver location A1 , A2 , the resulting amplitude Ar may be found qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi by the cosine theorem as Ar ¼ A21 þ A22 þ 2A1 A2 cos  (see phasor diagram in Figure 3.11a). The periodicity of Ar as a function of  means its periodicity in dependence on the propagation difference . When the receiver moves along the line connecting the reflectors its displacement by w /2 in any direction changes  by one wavelength w so that  changes by 2 and values of Ar at the points separated by w /2 are identical. In other words, interference of two impinging waves creates a stationary wave with period w /2. Moving along the tested line the receiver will alternate observing maximal A1 þ A2 and minimal jA1 A2 j amplitudes each w /2 m. If the amplitudes of the reflected signals are close (rather probable case) the resulting power Pr ¼ A2r /2 ¼ (A21 þ A22 )/2 þ A1 A2 cos  drops almost (or precisely) to zero when the Receiver Reflector

Reflector D″1

D″2

Obstacle D′1

D′2

Transmitter

Figure 3.10 The two-path case

93

Merits of spread spectrum

A1

A2

A1

Ar

Ar

φ A2

Am

(a)

(b)

Figure 3.11 Interpretation of multipath effects with phasor diagrams receiver passes the stationary wave nodes. This is exactly the phenomenon called multipath fading. Since the space distance between adjacent peaks of Pr is comparable with a wavelength, for the system operating in metre or decimetre band the time cycles of changing Pr at the moving receiver input will be rather short (typically split seconds). The plot of Pr in dependence on time in Figure 3.12 gives an example for parameter values typical of mobile communications: w  0:3 m and the receiver carrier speed Vr ¼ 60 km/h. As is seen, even with rather small speed of movement, changes of the received power are very rapid. This explains why multipath fading is also called short-term fading or small-scale fading.

1.2

Received power

1.0 0.8 0.6 0.4 0.2 0

0

0.01

0.02

0.03 t(s)

0.04

0.05

0.06

Figure 3.12 Time profile of the received power in the case of two-path fading

Clearly, this example is artificially simplified in order to present the phenomenon in the most explicit way. In practice, the number of multipath signals L received simultaneously may be very large and as a result the interference pattern becomes more complicated. The phasor diagram in Figure 3.11b illustrates a situation of this kind. The chaotic character of the distribution of reflectors or scatterers in the receiver environment makes the interference pattern unpredictable and its statistical description most appropriate.

94

Spread Spectrum and CDMA

Example 3.5.2. Figure 3.13 shows the time profile of the received power obtained by modelling in Matlab of the propagation environment with five reflectors located equiprobably within the square of side equal to the transmitter–receiver initial distance D ¼ 30 km. The received power is normalized to the average one. The wavelength and user’s speed are 0.3 m and 60 km/h, respectively. The irregular character of the power change is fairly explicit as well as the presence of deep drops of the received signal intensity. 4.0 3.5

Received power

3.0 2.5 2.0 1.5 1.0 0.5 0

0

0.02

0.04

0.06

0.08 t(s)

0.10

0.12

0.14

0.16

Figure 3.13 Time profile of the received power in the case of five-path fading

Due to the central limit theorem, a superposition of independent and nearly equally contributing random summands tends to become Gaussian whenever their number grows. Therefore, numerous multipath signals obeying these conditions produce a bandpass Gaussian process at the receiver input. If a dominating deterministic component (like the LOS one) is not present among them the resulting Gaussian process will be a zero-mean one. But the envelope of such a process has Rayleigh distribution (see Section 3.2) and thus we come to a model of Rayleigh fading channel. Now, the received amplitude Ar is not deterministic but, instead, random, meeting the Rayleigh PDF: WðAr Þ ¼

(

2Ar expð A2r Þ; Ar  0 0; Ar < 0

ð3:12Þ

Since in the product Ar S_ (t), the ‘genuine’, actually measurable signal amplitude is split between two cofactors, and this may be done arbitrarily, a convenient normalization is assumed in (3.12) setting the mean square of Ar equal to one: A2r ¼ 1. A plot of PDF (3.12) is shown in Figure 3.14.

95

Merits of spread spectrum

0.9 0.8 0.7

W(Ar)

0.6 0.5 0.4 0.3 0.2 0.1 0

0

0.5

1.0

1.5

2.0

2.5

3.0

3.5

Ar

Figure 3.14 Rayleigh PDF

Rayleigh fading is characteristic of numerous systems, including, along with communications, radar, navigation etc. The deep falls in signal intensity inherent in it are not as a rule neutralized by sporadic rises of Ar when multipath signals arrive nearly in phase. As a result, the overall effect of Rayleigh fading on the system performance appears to be pretty destructive, as the analysis below corroborates.

3.5.4 Performance analysis Consider as an example binary data transmission over the Rayleigh channel with a slow and flat fading. The first of the attributes means that the interference pattern remains stable during many symbols and the current reference phase may be retrieved from the received signal by averaging over an appropriate time interval. In other words, signal randomness does not exclude the BPSK from the available options. The second term stresses that the delay spread of multipath signals ds is small enough compared to the duration Tb of the individual BPSK bit: ds  Tb . As a result, successive BPSK symbols do not overlap with each other, i.e. ISI (see Section 2.15) does not emerge. To understand why the word ‘flat’ is relevant, return to (3.11) and note that an adequate model of a multipath channel is a delay line with taps having delays i and complex weights Ai exp (ji ). The transfer function of such a system strongly depends on tap delays, and when ds  Tb is rather uniform (flat) within the signal bandwidth so that all signal frequency components are distorted identically and signal shape remains unchanged. The only sort of corruption which the signal undergoes due to multipath propagation in such a case is Rayleigh amplitude fluctuations described by (3.12). Figure 3.15 enlarges on these definitions. Plots simulated in Matlab show a slow flat fading (a) as opposed to the fast flat one (b) for the case of the bell-shaped symbol pulses. The second of the fading types is characterized by a rapid change of the interference pattern in time so that distortions of successive symbols are practically independent.

96

Spread Spectrum and CDMA

(a)

Received signal

6 4 2 0 –2 –4 –6

0

2

4

6

8

10 t

12

14

16

18

20

0

2

4

6

8

10 t

12

14

16

18

20

(b)

Received signal

6 4 2 0 –2 –4 –6

Figure 3.15 Slow (a) and fast (b) fading

Let the energy of the received signal corresponding to Ar ¼ 1 be E. Then the energy of a signal with another value of amplitude is E(Ar ) ¼ A2r E and the average energy again equals E due to the normalization adopted above: E(Ar ) ¼ A2r E ¼ E. Equation (2.19) may be used to calculate a conditional error probability Pe (Ar ), when the received amplitude is assumed fixed and equal to Ar : sffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi! sffiffiffiffiffiffi! 2EðAr Þ 2E Pe ðAr Þ ¼ Q ¼ QðAr qb Þ ¼ Q Ar N0 N0 pffiffiffiffiffiffiffiffiffiffiffiffiffiffi where SNR qb ¼ 2E/N0 corresponds to the signal of energy E(A) ¼ E, i.e. of amplitude Ar ¼ 1. Actual amplitude Ar is random and fluctuates from one receiving session to another according to the Rayleigh PDF (3.12). It is natural, then, to characterize the performance of data transmission by the value of Pe (Ar ) averaged over all Ar . Reserving now the term ‘error probability’, with designation Pe , for this expectation we have: Pe ¼ Pe ðAr Þ ¼

Z1

Pe ðAr ÞWðAr ÞdAr ¼ 2

0

2 ¼ pffiffiffiffiffiffi 2

Z1 Z1 0

A r qb

Z1

QðAr qb ÞAr exp

0

Ar exp



   x2 exp A2r dxdAr 2



 A2r dAr

97

Merits of spread spectrum

where definition of the complementary error function Q(  ) is used. Reversing the order of the integrals gives: 3 2  2 Z1 Zx=qb  2 1 x 7 6 Pe ¼ pffiffiffiffiffiffi 4 2Ar exp Ar dAr 5 exp dx 2 2 0

1 ¼ pffiffiffiffiffiffi 2

1 ¼ pffiffiffiffiffiffi 2

0

Z1 

1

exp

0

Z1

exp

0





x2 q2b

 x2 dx 2





 x2 dx 2

Z1



exp

1 pffiffiffiffiffiffi 2

exp

0

 ðq2b þ 2Þx2 dx 2q2b

where the first term equals Q(0) ¼ 1/2 and the second is brought to the same form if

qffiffiffiffiffiffiffiffiffiffiffiffiffi  multiplied by q2b þ 2 /qb . Finally: 0

1B P e ¼ @1 2

1

qb C qffiffiffiffiffiffiffiffiffiffiffiffiffiA q2b þ 2

ð3:13Þ

To assess quantitatively the extent of the harmful influence of the fading, look at Figure 3.16, which presents error probabilities of the BPSK transmission over the AWGN and Rayleigh channels. As is seen, Pe ¼ 10 3 in the AWGN channel may be guaranteed with the bit SNR around 10 dB, while the Rayleigh channel requires bit SNR of at least 27 dB, 0 AWGN Rayleigh

–1

lgPe

–2

–3

–4

–5

–6

0

5

10

15

20

25

30

Bit SNR (dB)

Figure 3.16 Bit error probability for AWGN and Rayleigh channels

98

Spread Spectrum and CDMA

i.e. 50 times higher. This drastic energy loss due to the fading gets greater when higher transmission reliability is necessary and becomes close to 25 dB (300 times) for Pe ¼ 10 4 . The physical explanation of a quite detrimental fading effect is rather straightforward. Sporadic sharp drops in signal intensity due to the multipath interference are rather likely in the Rayleigh channel. Elementary integration of PDF (3.12) shows, for instance, that the probability of Ar falling below the level 0.4 (SNR decreases by 8 dB) is about 0.15. Then, as is seen from Figure 3.16 (dashed line), in those sessions where such drops happen, the error probability can not be lower than 0.1 if reference SNR is 10 dB. Since the share of such sessions is 0.15, their contribution to the total (average) error probability will be no less than 0:1  0:15 ¼ 0:015, i.e. 15 times bigger than the value corresponding to the reference SNR. This effect cannot in any way be compensated by possible favourable sessions with high SNR, since their contribution to the total error probability is never negative. The consequence of multipath propagation may potentially be even more dramatic when the fading is frequency selective. This term, as opposed to the attribute ‘flat’, defines the situation where the channel transfer function is not uniform within the signal bandwidth. This happens if the delay spread covers several transmitted bits so that at the channel output the previous bits overlap with the current one. To counter this ISI, special filters (equalizers) are used, which rectify the channel transfer function nonuniformity. On the other hand, frequency selectivity when used properly is a good resource for countering fading by arranging the multipath diversity discussed in Section 3.7.

3.6 Diversity The general idea of combating destructive multipath effects consists in diversity, which means arranging several independent transmission channels or branches. Thanks to this, despite every individual branch remaining liable to Rayleigh (or other) fading, the probability that the interference patterns in all of them are simultaneously poor is defined by the multiplication rule and thus diminishes radically. Take the figures of the example at the end of the previous section and suppose that two identical independent branches are somehow organized. Then the probability of the same fall of signal power in both of them at once is 0:152 ¼ 2:25  10 2 , i.e. perceptibly smaller compared to the probability of poor conditions in an individual branch. With a larger number of branches this diversity gain becomes more and more substantial. Branches operate in parallel, as though they secured each other, mitigating fading impairment. In other words, we know that the poor performance resulting from multipath fading is entirely due to the deep drops of SNR occurring from time to time. Hence, the final objective of diversity techniques is to process jointly signals of the branches in a manner that makes ‘better’ (higher SNR) branches more influential on the overall performance in comparison to the worse ones. Such joint processing is called combining.

3.6.1 Combining modes Various strategies for combining the results of processing signals arriving via different branches may be used at the receiver. Suppose that there are nd diversity branches

99

Merits of spread spectrum

altogether and let Ai , i and i be current signal amplitude, signal phase and noise standard deviation in the ith branch, where i ¼ 1, 2, . . . , nd . What, then, is the best linear processing producing the maximum possible resultant SNR? linear form of the P d Any wi ui where weights wi branch responses ui , i ¼ 1, 2, . . . , nd is their weighted sum ni¼1 are in general complex. Then the resultant power SNR q2r is just the ratio between the magnitude of the deterministic component of this sum and the variance of its noise component. The latter is simply the sum of branch noise variances weighted by jwi j2 , since branches are independent. Therefore: 2 n d  P  w Ai expðji Þ i   ð3:14Þ q2r ¼ i¼1 nd P jwi j2 2i i¼1

The sum in the numerator of (3.14) may be treated as an inner product of two nd -dimensional vectors whose components are wi i and (Ai /i ) exp (ji ). No inner product can have modulus greater than the product of the lengths of vectors, which is well known as Schwarz’s inequality [1,2]. Consequently:  n  n d d P P A2i 2 2 jwi j i nd nd 2 X X A2i i¼1 i q2r  i¼1 nd q2i ð3:15Þ ¼ ¼ 2 P  2 2 i i¼1 i¼1 jwi j i i¼1

where qi ¼ Ai /i is voltage SNR of the ith diversity branch. When optimal weights: wi ¼

Ai expð ji Þ 2i

are taken, inequality (3.15) becomes an equality, i.e. maximal possible resultant SNR is achieved. Such weights, as is readily seen, realize joined matched filtering of the responses of the diversity branches. Technically it is possible only when accurate values of all signal amplitudes and phases are known. Then signals can be summed coherently with an appropriate amplitude weighting. This combining technique is often referred to in the literature as the maximal ratio technique [5,18]. To assess the efficiency of combining, denote maximal SNR over all the diversity branches by qmax and introduce the diversity gain as Gd ¼ q2r /q2max . Since Pnd 2 2  n q d qmax no combining scheme can provide gain greater than nd , and the latter i¼1 i is achievable only in the maximal ratio scheme under the additional stipulation that all the diversity branches have the same SNR. In practice, some other combining schemes find application, too, because maximal ratio processing is rather demanding as to the extra arrangements necessary (to measure SNR and phase in a diversity branch some special pilot signal may appear necessary etc.). Alternative combining modes are equal-weight combining and selection of a maximum SNR branch. The first approaches the maximal ratio mode in effectiveness if all the diversity branches have nearly equal SNR. The gain of the second is close to that of the optimal scheme if one of the diversity branches dominates over the rest in value of SNR.

100

Spread Spectrum and CDMA

Certainly, these strategies can be combined with each other, e.g. several branches with the best SNR values are selected and then their outputs are summed with equal weights. Consider now traditional ways of organizing independent diversity branches.

3.6.2 Arranging diversity branches The traditional ways to set up independent diversity branches may be categorized as follows: . . . . .

Space diversity Frequency diversity Time diversity Polarization diversity Multipath diversity.

Space diversity implies creating several independent propagation paths at the expense of involving multiple antennas, which explains the other popular name for this technique: antenna diversity. Duplicating antennas may be used at the receiving side as well as at the transmitting side. Being spaced from each other by a distance of 7–10 wavelengths or more, they provide practical independence of parallel interference patterns at the receiver input. When used at the receiver (Figure 3.17) (receive diversity) antenna diversity is most effective, since additional antennas utilize signal energy which otherwise would not be captured at all. In this case diversity signals are separated automatically since different antennas receive them. Being matched-filtered individually, they may be further combined as described above. Transmitting antenna diversity (transmit diversity) is not that straightforward. First, as is seen from Figure 3.18, a limited total transmitter energy resource should be divided between several transmitting antennas. Second, the receiver antenna receives the mixture of signals emitted by all transmitting antennas. Therefore, some measures should be taken to provide an opportunity for separation and individual processing of those signals by the receiver before combining. These factors make this sort of diversity a sophisticated optimization problem, solving which is the subject of a special branch of communication theory called space–time coding (see Section 10.3). Reflector

Transmitter

Receiver

Figure 3.17 Receive antenna diversity

101

Merits of spread spectrum

Reflector

Transmitter

Receiver

Figure 3.18

Transmit antenna diversity

Certainly, when the technological constraints allow it, the combination of transmit and receive antenna diversity may be used to gain maximal benefits. The idea of frequency diversity is based on the concept of the channel coherence bandwidth. This notion determines the frequency range within which fading is considered as flat, i.e. distortion of signal frequency components is strongly dependent. On the other hand, the harmonics with frequency space beyond the coherence bandwidth may be treated as independently distorted by the channel. As was already underlined in the previous section, the frequency range of the flat fading depends inversely on the delay spread, so the wider the range of dispersing signals in time, the shorter the coherence bandwidth. Evidently, transmitting the same signal simultaneously at nd carriers whose frequencies are offset by coherence bandwidth or more creates nd diversity branches. We may say that frequency diversity puts frequency selectivity of fading to good use. Figure 3.19 gives an elementary clarification of the idea. The waves of two wavelengths w1 and w2 propagating along the same couple of paths have identical geometrical propagation differences . However, the phase differences between the signals of the two paths are individual for each wavelength and equal to 2/ w1 and 2/ w2 , respectively. When one of these phase differences leads to attenuation of the resultant signal the other may appear less destructive. With many parallel propagation paths present statistical interpretation comes into force, and frequency difference exceeding the channel coherence bandwidth provides the independence of diversity branches in this scheme. An appropriate choice of frequencies in this diversity scheme provides separation of branches at the receiver with the help of bandpass filtering. Reflector φ1 = 2πδ/λw1 φ2 = 2πδ/λw2 λw1 λw2 Transmitter

Receiver

Figure 3.19

Frequency diversity

102

Spread Spectrum and CDMA

Time diversity exploits time-variance of the multipath pattern. Even when the receiver does not move, the multipath profile may be unstable due to the motion of the transmitter or surrounding reflectors. Thereby Doppler scattering of the received signal arises, and the greater is its spread, the smaller is the coherence time of the channel, i.e. the time interval during which the received signal power remains nearly stable. Consider again the time–frequency duality: the correlation range in the frequency domain (coherence bandwidth) is inverse to the spread in time (delay spread), while in the time domain (coherence time) it is inverse to the frequency shift (Doppler) spread. Since at the time moments spaced apart by coherence time or more, fading patterns may be treated as independent, retransmission of nd replicas of the same information at appropriate time intervals creates nd diversity branches. With a slight modification this principle is universally used in telecommunications in the form of interleaving. Polarization diversity, which exploits the difference of multipath profiles of waves with different polarization, has not yet found wide application. As for the last item in the list above, it possesses quite an important role in our context and will be discussed separately in the next section.

3.7 Multipath diversity and RAKE receiver A conventional frequency diversity touched upon above implies parallel transmission of the same signal on several carriers, the spacing between them being bigger than the channel coherence bandwidth. Typically this technique is used when the signal spectrum is narrow enough compared to the coherence bandwidth to make the fading flat. The other version of frequency diversity is multipath diversity, exploiting signals with spectrum deliberately extended beyond the coherence bandwidth. Thereby fading becomes frequency selective, allowing in principle time resolution of multipath signals. Thus, the multipath diversity scheme is based on the fact that the signals propagating along the different paths reach the receiver with different time delays. Suppose that the resultant received signal with the complex envelope (3.11) is passed through the filter matched to the signal s(t). Then, taking into account filter linearity and the connection between signal ACF and the matched filter response (see Section 2.11), we will have for the complex envelope S_ rf (t) at the filter output: X S_ rf ðtÞ ¼ Ai R_ ðt i TÞ expðji Þ ð3:16Þ i

where R_ ( ) is ACF of the reference signal complex envelope S_ (t) defined by (2.66) and T, as usually, denotes the duration of the signal s(t). Let the signal correlation spread c , i.e. ACF time-extension, be no greater than the minimum mutual delay of the successive multipath signals min ¼ minf i i 1 g: c  min . It is obvious that in such a situation i

all multipath signals after the matched filter will not overlap. Since they are fully resolved in time and do not interfere with each other, we may treat them as signals of the independent diversity branches and process according to one of the combining algorithms described above. If, for instance, their time positions, amplitudes and initial phases are known (say, preliminarily measured using a separate pilot channel), maximal ratio combining is the best choice.

103

Merits of spread spectrum

It should be clear that to realize this multipath diversity scheme, a signal with a short ACF is necessary. As the discussion of Sections 2.12 and 2.15 showed, a ‘brute force’ solution of this task exists, consisting in employing short signals. This, however, means transmission of high peak power, which cannot be afforded in numerous cases. Much more attractive is the use of special signals featuring time-compression in the matched filter, i.e. having correlation spread small in comparison to duration: c  T. These signals can only be found among spread spectrum ones, so we may add to the list of the merits of spread spectrum one more advantage: feasibility of organizing the multipath diversity scheme. Multipath diversity is unique in the sense that it radically changes the attitude towards multipath effects, which at first sight are taken as implicitly harmful. As the discussion above exhibits, reflection of waves has a fruitful side, too. Actually, any contributing reflector directs to the receiver part of the emitted energy which would otherwise be entirely lost. When these reflected signals may be separated from each other (time-resolved), this energy is utilized, improving the system performance against that in their absence. The channel itself, in effect, creates diversity branches in this scheme, the only problem being adequate signal design allowing the multipath replicas to be resolved. Example 3.7.1. Consider the illustration of the diversity scheme applied to digital communications given by Figure 3.20. Matlab is used to simulate the BPSK transmission with bit duration T over

BPSK signal

BPSK signal

1 0 –1

0

2

4

Multipath signal

Multipath signal

1

2 0 –2 0

1

1

2

1

2

4 2 0 –2 –4

0

2

1 MF output

1 MF output

0 –1

0

–4

1

0 –1

0 –1

0

1

2

0

1

2

t/T

t/T

(a)

(b)

Figure 3.20 Multipath effects in BPSK transmission: (a) plain signals and (b) spread spectrum

104

Spread Spectrum and CDMA

the channel whose three paths have mutual delays 2 1 ¼ 3 2  0:15T . The amplitudes of the multipath signals are A1 ¼ 1, A2 ¼ 0:8, A3 ¼ 0:9, and the phases of the second and third are opposite to the phase of the first. For the sake of transparency, only baseband equivalents (complex envelopes) of all signals are shown. The left column (a) corresponds to the transmission of one bit by a plain rectangular pulse, zero bit content being sent by positive polarity (upper plot). The second plot of the column shows the resultant signal at the channel output, ignoring noise. Although ISI exhibits itself by distortion of the initial part of a bit pulse, the major portion of the pulse undergoes flat fading. The lowest plot demonstrates five superimposed realizations of the matched filter response to the resultant signal, in the presence of noise. The destructive effect of multipath propagation is clearly seen: reliable decisions on the transmitted bits are hardly possible at all. As an opposite example, column (b) relates to the transmission mode, where every bit manipulates the polarity of a spread spectrum signal, specifically a binary Barker code of length N ¼ 13 (see Section 6.4). The upper plot shows three such pulses manipulated by the same bit pattern as earlier. In the second plot a resultant noiseless signal at the channel output is given. The lowest plot demonstrates the matched filter response to the resultant signal corrupted with white noise of the same intensity as in the previous case. The three distinctive peaks per one transmitted bit are all available to retrieve the transmitted data with high confidence. Assuming the channel model is known beforehand, the samples may be taken at the accurate moments of the maximums of each noiseless multipath component at the matched filter output. As is seen, a properly chosen spread spectrum bit pulse provides resolution of all multipath components at the filter output with no mutual interference. The three samples may then be combined optimally, i.e. weighted proportionally to their amplitudes and summed after alternation of the polarity of the second and third components. An equivalent realization of combining is shown in Figure 3.21, where the tapped delay line is used to align in time three noiseless multipath peaks at the filter output. Then the non-delayed waveform weighted by A3 ¼ 0:9 and the one delayed by 3 2 weighted by A2 ¼ 0:8 are summed with the waveform delayed by 3 1 to produce the optimal combiner output. qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi The voltage SNR of the output is 1 þ A22 þ A23  1:56 times higher compared to that of the

first path. The SNR gain is apparent in Figure 3.22, where the upper plot repeats the matched filter output of Figure 3.20b and the lower plot shows the output voltage of the adder. Sampling the adder output at the moments 3 þ T , 3 þ 2T , . . . and fixing the polarities of the samples provides the decisions on the transmitted bits.

From matched filter

–A3

×

Delay τ3 – τ2

Delay τ2 – τ1

–A2

×

Σ

To decision unit

Sampling at τ3 + iT

Figure 3.21 Maximal ratio combining for the channel of Figure 3.19

105

Merits of spread spectrum

MF output

1.0 0.5 0.0 –0.5 –1.0 0

0.5

1.0

1.5

2.0

2.5

2.0

2.5

Combiner output

t/T

2

0

–2 0

0.5

1.0

1.5 t/T

Figure 3.22 Outputs of the matched filter and adder

The multipath diversity principle was proposed by Price and Green in 1958. Since then it has been widely known by the nickname RAKE, because the peaks at the matched filter output (Figures 3.20 and 3.22) resemble the fingers of a popular garden implement. Numerous implementations of the RAKE algorithm are around. One of them uses nd parallel correlators instead of a matched filter, nd being the number of fingers, i.e. exploited multipath diversity branches. This structure is most practical when delays of multipath signals are estimated precisely and may be considered as known. A correlator with reference signal delayed by outputs the value equal to the sample at the matched filter output at the moment T þ . Then, since only samples at the moments T þ i , i ¼ 1, 2, . . . , nd are necessary to make a decision, we may use nd delayed replicas of the signal as references in the correlators, thereafter combining their outputs in an appropriate manner. The advantage of such a structure compared to the matched filter one is that for a complicated spread spectrum modulation, implementation of the correlator is often much more feasible than that of the matched filter, since, unlike the latter, the former computes only a single sample of the correlation (see Section 2.11). With maximal ratio combining a correlator-based RAKE receiver looks as shown in Figure 3.23 (a complex-envelope-processing version is presented). To emphasize the practical role of the RAKE diversity it is enough to refer to the 2G (IS-95) and 3G (UMTS, cdma2000) cellular CDMA standards, which employ this principle as an integral part of their philosophy.

106

Spread Spectrum and CDMA

Correlator

A1 exp(–jφ1)S*(t – τ1)

To decision unit

Σ

Correlator

Y(t)

A2 exp(–jφ2)S*(t – τ2)

Correlator

An exp(–jφn )S*(t – τn ) d

d

d

Figure 3.23 Correlator-based RAKE receiver

Problems General directions . If the shape of a signal or/and interference spectrum is not specified take it as rectangular. . The term ‘matched filter’ is used for the filter matched to signal against AWGN

background. . Where the barrage jammer is considered neglect AWGN.

3.1. A system needs the highest possible ratio of useful signal power to total interference power, including AWGN and a jammer. A narrowband jammer is present. Which of the two strategies is better: ignoring the jammer or band-elimination filtering, if: (a) Jammer power equals AWGN power within the signal bandwidth and jammer bandwidth is half of the signal bandwidth? (b) Jammer power is 6 dB below AWGN power within the signal bandwidth and jammer bandwidth is a quarter of the signal bandwidth? (c) Jammer power is 3 dB above AWGN power within the signal bandwidth and jammer bandwidth is a quarter of the signal bandwidth? 3.2. Spectra of the signal and narrowband jammer are given in Figure 3.24. What is the most harmful central frequency of the jammer when a receiver ignores the jammer and when it employs band-elimination filtering? Signal

f1 f 0 f 2

Jammer

f

Figure 3.24 Signal and jammer spectra

Merits of spread spectrum

107

3.3. In some system power SIR at the matched filter output degrades 101 times as compared to power SNR, while the system can preserve its operation capability with only two-times degrading SIR. What should be changed in the signal, SNR remaining constant, if (a) Only plain signals are allowed? (b) Signal peak power cannot be raised (what should the signal processing gain be in this case)? 3.4. In some system a band-elimination filter neutralizes the narrowband jammer. Due to this, the matched filter SNR degrades by 3 dB. (a) What should be done to the plain signal duration and amplitude if only 2% degradation in power SNR is tolerable (SNR in the absence of band-elimination is fixed)? (b) Is it possible to push degradation below 2% without increasing signal power? If so, what should the signal processing gain be? 3.5. A system can operate with SNR no smaller than 10 dB. Due to a barrage jammer SNR drops to 3 dB. How could the signal parameters be changed to neutralize the jammer, if: (a) (b) (c) (d)

Only plain signal of the fixed energy is allowed? Only plain signal of the same peak power can be used? Peak power and energy of the signal are fixed with no other constraints? Peak power of the signal is fixed and its bandwidth can be increased only 10 times?

Find the processing gain in cases (c) and (d). 3.6. In conflict with a barrage jammer transmitter, a system increases signal duration by 4 times with simultaneous halving of signal power and widening of the bandwidth by 50 times. The jammer transmitter is capable of increasing its power no more than 13 dB. Who will be the winner in this game? 3.7. A signal occupies two separate sub-bands of identical width W0 . Total signal energy is distributed between them in the proportion 9:16. In the receiver two matched filters process both sub-band parts and their outputs are combined optimally to maximize a resultant SNR. There is a barrage jammer transmitter. What is the most harmful distribution of its total power between the signal sub-bands? 3.8. Matched filter SNR for an intended receiver equals 14 dB. The processing gain of the signal WT ¼ 400. Find: (a) Ratio of power spectrum densities of the signal and background AWGN. (b) SNR at the integrator output of an interceptor radiometer. 3.9. In the BPSK data transmission system error probability per bit Pe ¼ 1:5  10 3 is required. A system designer wants the SNR of the interceptor radiometer to be no greater than 10 dB per one transmitted bit duration. What processing gain per one bit would be satisfactory?

108

Spread Spectrum and CDMA

3.10. The interceptor radiometer SNR is 10 dB per signal duration, whereas the intended receiver needs SNR 12 dB. Signal duration T ¼ 100 ms. What should its minimal bandwidth be? 3.11. Two spread spectrum BPSK data transmission systems are compared. The first employs binary modulation to widen the bandwidth, providing processing gain of 100 per data bit. The second operates with a ternary modulation resulting in processing gain of 50 per data bit. Which of them has better immunity to cracking a modulation law, the data rate being the same? 3.12. Two spread spectrum BPSK data transmission systems operating at the same data rate are compared. In the first an intended receiver SNR per data bit is 12 dB, while the interceptor radiometer SNR per bit is 12 dB. For the second system these parameters are 16 and 4 dB, respectively. Which of them is more immune to breaking a modulation law? 3.13. A system designer takes care of the EMC of a developed system. The maximal SNR provided by the new system over the entire zone covered by the old ones is 20 dB. Any old system operates with a satisfactory quality if the extra power spectrum density does not exceed 10 dB compared to the background AWGN spectrum. What should the minimum processing gain of the new system be? 3.14. There are two spread spectrum systems occupying the same total bandwidth and operating inside the same geographical area. The maximal SNR over all the intersection of their operational zones are 20 and 17 dB, respectively. For their compatibility, the extra power spectrum density due to the emission of the other system should be at least 7 dB below the natural AWGN level. Find the minimal processing gain of each of the systems. 3.15. For normal functioning, the system operating at the wavelength w ¼ 30 cm needs signal-to-AWGN ratio q ¼ 14 dB. Signal duration T ¼ 100 ms and the noise temperature of the receiver n ¼ 1000 K. The transmitter antenna has gain of 5 dB, while the receiving antenna is omnidirectional. Find the necessary transmitted power for a free-space propagation model, if the system coverage zone should have a radius no smaller than 30 km. How will this power increase for the conditions typical of mobile telephone with the distance-attenuation exponent 3.84, no other adjustment of the free-space model being necessary? 3.16. A system survives if the received voltage SNR drops no more than 4 times below the average predicted level. Find the probability of system failure due to long-term fading with the standard deviation of the decibel power content equal to 9 dB. 3.17. There are two propagation paths: LOS and one through a reflector located 3 km away from the LOS and equidistant from both receiver and transmitter. Find the standing wave period in metres and the time interval between successive power drops at a distance 12 km from the transmitter for a receiver moving at a constant speed of 60 km/h if the wavelength is 30 cm. 3.18. Is it practical to use BPSK in the channel with fast multipath Rayleigh fading? What binary transmission mode is advisable in this case? 3.19. Binary data are transmitted over a channel with lognormal long-term and Rayleigh short-term fading. Due to the long-term fading, the signal power fluctuates around

Merits of spread spectrum

3.20.

3.21.

3.22.

3.23.

3.24.

109

27 dB with standard deviation 12 dB. Is bit error probability of 10 3 achievable in this channel without error-control coding? There are two Rayleigh diversity branches with identical average signal energies. Using average power SNR at the combiner output as a criterion, compare the energy gains of two combining techniques: the maximal ratio one and selection of a maximum SNR branch. A signal of a system occupies bandwidth of 60 kHz. The delay spread of the channel is 20 ms. The total bandwidth is no greater than 300 kHz. How many frequency diversity branches may be arranged? There are four propagation paths with lengths 5 km, 5.4 km, 5.55 km and 6 km. A system transmits data at the rate R ¼ 20 kbps. Estimate the approximate signal bandwidth and minimal processing gain necessary for arranging a 4-finger RAKE receiver. The minimum difference of lengths of paths in a channel is 300 m. The delay spread of the channel is within 10 ms. The system transmits data using QPSK at the rate 20 kbps. What is the maximal available number of RAKE fingers? Find the necessary bandwidth and processing gain of the signal for arranging the RAKE receiver. A RAKE receiver splits the resultant signal at the output of a Rayleigh channel into nd non-fading signals of equal power using maximal ratio combining. How does the average power SNR at the combiner output differ from the case when the RAKE algorithm is not used? In the light of the answer how can the energy gain of the RAKE technique be explained?

Matlab-based problems 3.25. Write a program illustrating the advantages of spread spectrum in countering a narrowband jammer when the receiver does not use band-elimination filtering (Figure 3.4). (a) Form and plot two rectangular bandpass signals of the same duration T (vectors of dimension 1000): a plain pulse and an LFM pulse with deviation (40–50)/T (see Problems 2.55–2.56). Take carrier frequency to have 25–30 periods per signal duration. (b) Form the matrix of a CW jammer with 10 rows, each row having frequency equal to the signal carrier frequency and random initial phase uniformly distributed over [ , ]. (c) Form observation matrices for both signals by adding the signals to the jammer. Set up the jammer level several (2–10) times higher than the signal level. Plot the observations. (d) Process the observations with corresponding matched filters. Plot the filter output waveforms. (e) Run the program, varying the jammer intensity and frequency, and explain the results.

110

Spread Spectrum and CDMA

3.26. Write a program illustrating the advantages of spread spectrum in countering a narrowband jammer when the receiver uses band-elimination filtering (example plots before and after band elimination are shown in Figure 3.25).

LFM signal + jam

20

10 0 –10

Filter output

–20

0

0.5

1.0

1.5

2.0

10 0 –10 –20

2

2

1

1

Filter output

Plain signal + jam

20

0 –1 –2

0

0.5

1.0 t/T

1.5

2.0

0

0.5

1.0

1.5

2.0

0

0.5

1.0 t/T

1.5

2.0

0 –1 –2

Figure 3.25 Simulation of band-elimination filtering

(a) Repeat items (a)–(c) of the previous problem. (b) Calculate and plot energy spectra of signals and observations. (c) Use band-elimination filtering forcing the spectrum component of the observation at the jammer frequency to zero. (d) Return to the time domain and plot the signals after band-elimination filtering. (e) Run the program for several combinations of jammer intensity and frequency, and interpret the results. 3.27. Write a program illustrating the advantages of spread spectrum in countering a barrage jammer (see Figure 3.5). (a) Repeat item (a) of Problem 3.25. (b) Form 10 jammer spectra for each of two signals so that they are non-zero only within the bandwidth of a proper signal. Take spectral components to be Gaussian complex values with zero mean. Plot power spectra of the jammer; (c) Convert the jammer into the time domain and sum it with a proper signal to obtain observations. Adjust the power of the jammer so that for both signals voltage signal-to-jammer ratio are identical, lying in the range 0.5–1. (d) Process the observations with a proper matched filter and plot the filter output. (e) Run the program, varying the signal and jammer parameters, and interpret the results.

111

Merits of spread spectrum

3.28. Write a program illustrating the low-detection-probability feature of spread spectrum (see Figure 3.26). 1 Signal

Signal

1 0 –1

–1 0

0.5

1.0

1.5

0

0

0.5

0

0.5

1.0

1.5

1.0

1.5

0.5 50 f

t/T

1.5

1.0

0

0

–20

1.5

Spectrum

Spectrum

1.0

0.5 t/T

1.5

0

0 20 Signal + noise

Signal + noise

20

–20

0

100

1.0 0.5 0

0

50 f

100

Figure 3.26 Simulation of detecting signals by the radiometer

(a) Repeat item (a) of Problem 3.25. (b) Form 10 Gaussian noise realizations with zero mean and standard deviation three times higher than signal amplitude. (c) Sum the noise realizations and signal to produce 10 observations for each signal. (d) Convert the observations into the frequency domain and plot observation energy spectra for each of the signals. Interpret the plots in terms of the ability of the radiometer to detect the signal. 3.29. Write a program illustrating the good electromagnetic compatibility of spread spectrum systems, both between each other and with conventional systems. (a) Form complex envelopes of three rectangular pulses of the same energy and duration: a plain one and two LFM pulses with deviation Wd ¼ 50/T, the first with growing and the second with dropping frequency. (b) For all three cases, calculate complex envelopes of a matched filter response to the proper signal and two foreign ones. (c) Plot the real envelope for each of 9 responses of the previous item. (d) Interpret the plots in terms of electromagnetic compatibility. 3.30. Plot a logarithmic graph of attenuation of the received power with the distance from a transmitter for the propagation model Pr ¼ k/D , ¼ 2, 3, 3:84, 4.

112

Spread Spectrum and CDMA

3.31. Write a program demonstrating the phenomenon of multipath flat fading. (a) Form and plot a smooth plain bandpass pulse of duration T and carrier frequency within (20–30)/T. (b) Form and plot a sum of 10 copies of this pulse with equal amplitudes and random initial phases which are independently and uniformly distributed over [ , ]. (c) Plot the envelope of the resulting pulse. (d) Run the program repeatedly and comment on the results.

Res. envelope

3.32. Write a program demonstrating the validity of the Rayleigh model of short-term fading (see Figure 3.27). 10 5

Number of values

0

0

0.2

0.4

0.6

0.8

1.0 t

1.2

1.4

1.6

1.8

2.0

0

2

4

6

8

10

12

14

16

18

20

0

2

4

6

8

10

12

14

16

18

20

200 100 0

PDF

0.2 0.1 0

Resultant amplitude

Figure 3.27

Simulation of short-term fading

(a) Repeat item (a) of Problem 3.31. (b) Form a 1000  1 vector of complex amplitudes, the ith component of which is the sum of 20 exponents exp (jij ), i ¼ 1, 2, . . . , 1000; j ¼ 1, 2, . . . , 20 with all ij independent and uniformly distributed over [ , ]. (c) Plot several (3–7) example copies of the resultant real envelope of the pulse. (d) Build up a histogram of real amplitudes of the resulting pulse based on item (b). (e) Plot the Rayleigh distribution, scale it properly and compare it to the histogram of the previous item. 3.33. Write a program illustrating the antenna diversity technique (see Figure 3.28).

113

Merits of spread spectrum

1 Signal

Signal

1 0

0 –1

–1 0

1

2

3

0

1

t/T

3

40 τ profile

τ profile

60 40 20 0

5 0

–5 0

1

2 t/T

20

0

1 2 3 4 5 6 7 8 9 10 Number of path Received signal, antenna 2

Received signal, antenna 1

2 t/T

3

1 2 3 4 5 6 7 8 9 10 Number of path

5 0 –5 0

1

2

3

t/T

Figure 3.28 Simulation of receive antenna diversity

(a) Form and plot a plain smooth bandpass signal of duration T and carrier frequency (20–40)/T. (b) Form two delay profiles as vectors of 10 delays with random independent components uniformly distributed over [0,T/10]. (c) Form two complex envelopes of sums of 10 copies of the signal with initial phases calculated in accordance with the two delay profiles. (d) Plot two delay profiles and the corresponding resultant bandpass signals in a form suitable for comparison. (e) Run the program repeatedly and explain the results in terms of the diversity gain. 3.34. Write a program illustrating the frequency diversity principle. (a) Form and plot two plain smooth bandpass pulses of the same duration T and amplitude but with different carrier frequencies, e.g. 20/T and 30/T. (b) Form a delay profile as a vector of 10 delays independently and uniformly distributed over [0, T/10]. (c) Plot in a form convenient for comparison the delay profile and two sums of 10 copies of each signal with equal amplitudes and the initial phases calculated according to the delay profile and carrier frequency. (d) Run the program repeatedly, and explain the results in terms of the diversity gain. 3.35. Write a program illustrating the multipath diversity principle. Unlike what is presented in Figure 3.20, use an LFM bandpass pulse.

114

Spread Spectrum and CDMA

(a) Form and plot two rectangular bandpass bit pulses of the same duration T, amplitude and carrier frequency about (30–40)/T, the first being plain and the second being LFM with deviation Wd ¼(20–30)/T. (b) Set up a bit stream (5 to 6 bits) and arrange BPSK for both bit pulses. Plot the transmitted signals. (c) Add two delayed copies to the transmitted signal in both cases. Take amplitudes of the copies equal to that of the transmitted signal and delays around 0.15T and 0.3T. Plot the resultant received waveforms. (d) Calculate and plot matched filter response for each case. (e) Comment on the results. 3.36. Based on Problem 3.35, write a program demonstrating the effect of combining the path signals in a RAKE receiver.

4 Multiuser environment: code division multiple access 4.1 Multiuser systems and the multiple access problem Many modern wireless systems are of multiuser type. In a multiuser system multiple communication links are arranged within the total time–frequency resource so that every individual user is allowed to transmit or receive his specific data in parallel with the others and independently of them. An instructive example of a multiuser system where a single transmitter transmits data to multiple users is the downlink of a satellite system or of a cellular terrestrial system. Each user receiver in such a system should be able to filter out the data addressed to it individually from the observed signal containing data sent to many users. Another case is the uplink of a satellite or a terrestrial cellular system, where there are a number of parallel transmitters and the only receiver should separate and detect the data of each individual user in the resulting observed signal. In designing any multiuser system the principal issue is how to provide multiple access, i.e. the ability for many subscribers to use the communication channel simultaneously with minimal mutual interference. To describe this problem mathematically, suppose that the kth user’s data form a sequence bk ¼ (bk, 0 , bk, 1 , . . . ), where bk, i stands for the ith symbol in the data stream of the kth user. This sequence in one way or another modulates the specific kth user’s signal sk (t), producing the modulated signal sk (t; bk ). Passing through the channel every such signal may acquire amplitude Ak and time delay k and is summed with the signals of other users so that the overall or group signal reaching a receiver is: sðt; b1 ; b2 ; . . . ; bK Þ ¼

K X k¼1

Ak sk ðt

k ; bk Þ

where K is the number of active, i.e. actively transmitting, users, and arguments after the semicolon in the group signal stress its dependence on data of all active users.

Spread Spectrum and CDMA: Principles and Applications Ó 2005 John Wiley & Sons, Ltd

Valery P. Ipatov

116

Spread Spectrum and CDMA

Certainly, the group signal is accompanied by channel noise n(t) and the resultant observation is: yðtÞ ¼ sðt; b1 ; b2 ; . . . ; bK Þ þ nðtÞ ¼

K X k¼1

k ; bk Þ þ nðtÞ

Ak sk ðt

ð4:1Þ

The receiver should retrieve the user’s data from the observation y(t). According to the general ideas presented in Section 2.1, the key role in decisions on the received data bk , k ¼ 1, 2, . . . , K for the AWGN channel belongs to the (squared) Euclidean distance between observation y(t) and various copies of the group signal s(t; b1 , b2 , . . . , bK ) corresponding to all possible combinations of data of K users: 2

d ðs; yÞ ¼

ZT

½yðtÞ

sðt; b1 ; b2 ; . . . ; bK ފ2 dt

ð4:2Þ

0

Substituting (4.1) into (4.2) and opening the brackets leads to the equation: 2

d ðs; yÞ ¼ kyk

2

2

K X k¼1

Ak zk ðbk Þ þ

K X K X

Ak Al

k¼1 l¼1

ZT

sk ðt

k ; bk Þsl ðt

l ; bl Þ dt

ð4:3Þ

0

where zk (bk ) is the correlation (inner product) of the observation y(t) and the kth user’s signal modulated by the data sequence bk and delayed by k : zk ðbk Þ ¼

ZT

yðtÞsk ðt

k ; bk Þ dt

ð4:4Þ

0

Typically, estimating intensities and delays of all user signals precedes the decision on data sequences so that parameters Ak , k , k ¼ 1, 2, . . . , K in (4.3) and (4.4) may be assumed known precisely. Then the optimal (ML or minimum distance) strategy of recovering user data consists in substitution of all possible realizations of the sequences b1 , b2 , . . . , bK in (4.3) and selecting those of them which jointly minimize the squared distance (4.3).1 Such a decision rule, called multiuser detection, may appear quite impractical in a typical situation where the number of users K is measured in the tens or more. As an example take the simplest case of a synchronous system with zero mutual delays k ¼ 0, k ¼ 1, 2, . . . , K and binary data transmission. With the observation interval spanning only one bit, retrieving the individual bits of K ¼ 40 users would require testing 240 > 1012 bit patterns of all users, which looks absolutely infeasible from an implementation standpoint. We will revisit the issue of multiuser detection in Chapters 7 and 10.

1 This rule remains adequate even if the receiver is intended to recover only the individual (kth) user information sequence, as e.g. takes place in the downlink of a cellular mobile system. After estimating data of all users the receiver just discards the unnecessary data of all users but the kth one.

117

Multiuser environment: CDMA

The so-called conventional or single-user receiver realizes an alternative decision rule estimating each of the data sequences bk separately by maximizing the correlation (4.4). It is evident that this strategy coincides with the optimal (multiuser) one if and only if the third term of (4.3) does not depend on data sequences bk , k ¼ 1, 2, . . . , K at all. To meet the latter condition, one can use the modulation scheme possessing the following properties: (a) the user’s signal energy does not depend on transmitted data (PSK, FSK); (b) all user signals are orthogonal regardless of transmitted data. Both these requirements are expressed by the equation: ZT

sk ðt

k ; bk Þsl ðt

l ; bl Þ dt ¼ Ekl

ð4:5Þ

0

Calling this multiple access mode orthogonal and returning to the material of Sections 2.3 and 2.4, we recollect that the maximal number of orthogonal signals is limited by the total signal space dimension, and within the total bandwidth Wt and time resource Tt no more than 2Wt Tt bandpass orthogonal signals may exist. To derive from this the maximal available number of users in the orthogonal multiple access scheme, let us limit ourselves to M-ary PSK digital data transmission with fixed rate R bps. Assuming that all user signals should be orthogonal on the time interval equal to the M-ary symbol duration, we arrive at the equation Tt ¼ ( log2 M )/R. Therefore, the maximal signal space dimension is 2Wt Tt ¼ (2Wt log2 M )/R. When M ¼ 2 (BPSK), each user occupies only a one-dimensional subspace of the signal space, since only two antipodal pulses (i.e. two collinear vectors) are necessary to transmit one bit (see Figure 2.5a). In this case the maximal number of users coincides with the total signal space dimension. With M > 2 each user needs a two-dimensional subspace (i.e. a plane; see Figure 2.6c), and all those subspaces should be orthogonal according to (4.5), so that the maximal number of users becomes two times smaller than the total signal space dimension. Combining these results gives the upper bound of the maximal number of users in the orthogonal multiple access scheme: 8 2Wt > < ;M ¼ 2 R K¼ > : Wt log2 M ; M > 2 R

ð4:6Þ

In the following three sections we discuss briefly traditional ways of carrying orthogonal multiple access into effect.

4.2 Frequency division multiple access One of the simplest ways to fulfil requirement (4.5) is employing user signals whose spectra do not overlap. The idea is fully allied to that of frequency-shift orthogonal coding discussed in Section 2.7.2. This multiple access mode called frequency division multiple access (FDMA) is illustrated by Figure 4.1a. If M-ary PSK is used for data transmission at the rate R, the data symbol duration is Tt ¼ ( log2 M )/R so that each

118

Spread Spectrum and CDMA

~ s1( f )

s1(t) f

~ s2( f )

f

W = R/log2M Wt = KW

(a) Figure 4.1

t s2(t)

~

sK( f ) f

t

T = 1/Wt Tt = KT = (log2M)/R

sK(t)

(b)

t

Frequency (a) and time (b) division multiple access

user’s signal occupies bandwidth no smaller than W ¼ 1/Tt ¼ R/ log2 M. Then the total allowed bandwidth Wt could accommodate no greater than Wt /W ¼ (Wt log2 M)/R non-overlapping spectra. This is exactly the maximal number of users if M > 2, which is the case shown in Figure 4.1a. When M ¼ 2 and phase coherence is available each of those spectra may be utilized by two users whose carriers differ by only quadrature phase shift. As a result, the potential number of users in the FDMA scheme is subject to bound (4.6). In practice, non-ideal filtering, master clock generator drifts and Doppler frequency shifts may cause partial overlapping of the adjacent spectra, i.e. mutual interference between different user signals. To neutralize these effects and preserve separation of user signals a system designer is often forced to introduce guard frequency intervals between adjacent spectra, which decrease the achievable number of users as compared to bound (4.6). FDMA is the oldest and classical multiple access mode commonly used in both analog and digital wireless systems (radio broadcasting, TV, mobile radio etc.). Nonoverlapping spectra secure orthogonality, and hence separability of the user signals, regardless not only of data but also of time delays, thanks to which no synchronization between user signals is required. This fact is frequently referred to as a serious advantage of FDMA (see Section 4.5 for more detail).

4.3 Time division multiple access Another popular orthogonal multiple access scheme is time division multiple access (TDMA), in which user signals do not overlap in the time domain (Figure 4.1b). The idea is again borrowed from time-shift orthogonal coding (see Section 2.7.1). Specifically to the case of M-ary PSK, it means that the whole available time resource Tt ¼ ( log2 M)/R (in TDMA systems it is often called a frame) is divided into nonoverlapping slots of duration T. If M > 2 (this case is shown in Figure 4.1b) every slot may be used by only one user and the duration of the data symbol transmitted by it cannot be smaller than the inverse total bandwidth 1/Wt . Therefore, the total number of users is limited by the figure Tt /T ¼ (Wt log2 M)/R. When M ¼ 2 in the phase-coherent

Multiuser environment: CDMA

119

case two users may use the same slot having quadrature shifted carriers. As a result we again come to the bound (4.6) for the maximal value of K, demonstrating the theoretical equivalence of FDMA and TDMA in terms of the potential number of users accommodated. TDMA mode has found application in various systems, e.g. in 2G mobile radio (GSM, IS-136 etc.). Although its simplicity is superficially attractive, limiting factors should be mentioned too. First, every user’s signal occupies only a Kth (or perhaps a K/2th) part of the frame, which entails increasing peak-power K (or K/2) times as compared to the case of continuous emission in order to preserve the necessary signal energy, i.e. SNR. Implementation problems related to this have been repeatedly pointed out before. Second, strict synchronization is necessary between user signals at the receiver input, since otherwise they will overlap and create mutual interference. At the same time, in systems with migrating users, like the uplink of a mobile telephone, the lengths of the propagation paths between the user transmitters and the central station receiver are changing continually and over a wide range. Clearly, synchronization of the user signals at the receiver input in such situations, although possible in principle, might appear problematic technologically. The conventional way of getting around these obstructions consists in introducing guard time intervals between adjacent user signals, preventing them from being superimposed on each other within the whole range of variation of their delays. Rather commonly the guard intervals appear significant and may dramatically reduce the number of users compared to the upper bound (4.6). The severity of the problem is typically alleviated when an individual user’s slot carries not a single data symbol (e.g. a bit), but, instead, a burst of nb symbols. Then guard intervals are necessary for separating only the bursts of different users, which entails nb times smaller guard-time overhead. On the other hand, pauses between the successive bursts of the same user become nb times longer, too. In many systems (such as mobile telephone, where continuous speech exchange should be maintained) long pauses are not acceptable, and this frequently puts a tough limit on the length of bursts. For these reasons, ‘pure’ TDMA is not often encountered in practice. For example, the 2G mobile telephone standards combine TDMA and FDMA.

4.4 Synchronous code division multiple access Both FDMA and TDMA distribute the total available time–frequency resource between different users so that each user utilizes only his ‘personal’, user-specific fraction of it and no users share common fractions. In FDMA this fragmentation is done in the frequency domain (Figure 4.2a), and at the kth user’s disposal are the whole time resource (T ¼ Tt ) but only part W of the total frequency resource Wt . When the maximal number of users is a top priority, W ¼ 1/T  Wt /K. Splitting the time domain in TDMA (Figure 4.2b) makes it possible for the single user to occupy the whole available frequency range (W ¼ Wt ) but only part of the total time frame (T ¼ 1/W  Tt /K). If the number of users needs to be maximized the resource fragmentation in both these orthogonal multiple access schemes makes each user signal plain since its time frequency product WT ¼ 1.

120

Spread Spectrum and CDMA

Wt

Wt = W

K

W = Wt /M 1 2

k

k

K

2 1 Tt = T

Tt T = Tt /M

(a) Figure 4.2

(b)

Resource distribution in FDMA (a) and TDMA (b)

On the other hand, with a large necessary number of users K the total time–frequency product has to be large too (Wt Tt  1; see (4.6)), and if every user’s signal occupied both the total available bandwidth (W ¼ Wt ) and time interval (T ¼ Tt ) we would have an orthogonal multiple access scheme in which all user signals are spread spectrum ones. Such a multiuser system would enjoy all the advantages of spread spectrum technology studied in the previous chapter. Let us assume that the transmission may be arranged in a manner providing zero mutual delays between all user signals at the receiver input. Then without sacrificing generality all the absolute delays can be set equal to zero: k ¼ 0, k ¼ 1, 2, . . . , K. Take an arbitrary family of Wt Tt orthogonal spread spectrum signals (see Section 2.7.3), e.g. Walsh functions, and employ each of them as a user signal for M-ary PSK data transmission. An individual spread spectrum signal assigned to the kth user is called the kth signature. Every signature occupies the total bandwidth Wt and the total time frame Tt (Figure 4.3), transmitting log2 M bits of data over the interval Tt . If M > 2 this multiple access mode may serve up to K ¼ WT ¼ Wt Tt ¼ (Wt log2 M)/R users, while BPSK allows doubling of K by permitting two different users to exploit quadrature-phase-shifted copies of the same signature. Obviously, we again have the maximal possible number of users determined by (4.6), exactly as for both FDMA and TDMA. K k Wt = W

1

2

Tt = T

Figure 4.3

Resource utilization in spread-spectrum orthogonal multiple access

121

Multiuser environment: CDMA

In the considered multiple access mode an appropriate signature encoding provides orthogonality of the user signals instead of fragmentation of the time or frequency domain. That is why it has the name code division multiple access (CDMA). The advantages of CDMA compared to classical FDMA and TDMA (jamming immunity, low detection probability, opportunity to involve the RAKE algorithm etc) follow automatically from the spread spectrum nature of CDMA signatures. At the same time, signature synchronism is critical for their orthogonality and user separation at the receiving side. In order to distinguish this version of CDMA from the one to be studied in the next section, the term synchronous CDMA (S-CDMA) is used. Synchronous mode is easily achievable in systems where only a single transmitter (like the base station of a cellular network) transmits simultaneously individual data streams, each being addressed to a specific user (e.g. mobile station). That is why S-CDMA constitutes the basis of the physical layer of downlinks in 2G (IS-95) and 3G (UMTS, cdma2000) CDMA cellular networks. In parallel, the core idea of S-CDMA is used in both downlink and uplink of 3G standards for arranging the so-called multi-code transmission (see Section 11.3).

4.5 Asynchronous CDMA A situation typical of numerous applications is where delays k may change over a wide range, making synchronization of signatures at the receiver input problematic or even impossible. An instructive example of this is an uplink of a mobile cellular system where users migrate over the cell, as a result of which the distances between them and the base station change constantly, as do the arrival times of the user signals at the base station receiver. In principle, each user knowing his instantaneous location relative to the base station, and therefore propagation delay k , is capable of transmitting his signal with an advance k . Thereby all path delays will be compensated for and all the user signals will be synchronized at the base station receiver. This operational mode, however, places excessive demands on the complexity of equipment, and in many cases can hardly be regarded as commercially viable. Let us analyse the consequence of the asynchronous character of the received user signals. First of all, is it possible to preserve the orthogonality of signals in a wide range of mutual time shifts? Take two signals u(t) and v(t) and calculate their cross-correlation function (CCF) Ruv ( ), i.e. the inner product of u(t) and a copy of v(t) time-shifted by as a function of the argument :

Ruv ð Þ ¼

Z1

uðtÞvðt

Þ dt

1

Applying the Parseval theorem gives:

Ruv ð Þ ¼

Z1 1

u~ðf Þ~ v ðf Þ expð j2f Þ df

122

Spread Spectrum and CDMA

If the goal is signal orthogonality independently of mutual delay , the equality Ruv ( ) ¼ 0 should hold under all values , which due to the Fourier transform linearity is possible if and only if u~(f )~ v(f ) ¼ 0 everywhere in the frequency domain. This tells us that two signals are orthogonal under arbitrary time shifts if and only if their spectra do not overlap. But the multiple access scheme with non-overlapping spectra is FDMA! Hence, asynchronous orthogonal multiple access is realizable only with FDMA, which is often proclaimed as one of the main advantages of FDMA. But what sort of penalty will accompany an attempt to realize CDMA when signatures are not synchronous at the receiver input? Since the signatures of the different users within CDMA have overlapping spectra, they cannot remain orthogonal in a wide range of mutual delays, and equality (4.5) cannot be true for arbitrary values of k , l and data sequences bk , bl . As a result inter-user interference emerges, which is a non-zero response of the receiver intended for the kth user to signals of other users. Consider the kth user conventional receiver. With no loss of generality we may put k ¼ 0, rewriting (4.4) as: zk ðbk Þ ¼

ZT

yðtÞsk ðt; bk Þ dt

ð4:7Þ

0

According to the single-user rule, the estimate ^bk of data bk should maximize the decision statistic zk (bk ) as a function of bk . Substituting (4.1) (at this step we should replace bk of (4.1) by b0k in order to mark differently a genuine transmitted data b0k from that assumed in the course of decision making bk ) into (4.7) presents zk (bk ) in the form: zk ðbk Þ ¼ Ak

ZT

sk ðt; b0k Þsk ðt; bk Þ dt

0

þ

K X l¼1 l6¼k

Al

ZT 0

sl ðt

l ; b0l Þsk ðt; bk Þ dt

þ

ZT

nðtÞsk ðt; bk Þ dt

ð4:8Þ

0

The first and last terms of (4.8) give, respectively, the contribution of the proper, i.e. kth, user signal, and thermal additive noise into the kth user receiver effect. If no side users were present (K ¼ 1) the second addend would be zero and the whole problem would be no different to the one considered in Chapter 2. With K > 1 and arbitrary signature delays this term differs from zero, expressing the contribution of other user signals to the kth receiver output effect, i.e. mutual or multiple-access interference (MAI). An easy way to assess the influence of MAI is to treat all the alien signals as random noise-like processes similarly to what was frequently done in Chapter 3. In any practical asynchronous CDMA system, measures should be taken to equalize the level of all user signals at the receiver input in order to mitigate the near–far problem. The latter implies that MAI created by alien users which are much closer to the receiver than the kth user may significantly overpower the useful signal of the latter due to the strong dependence of the received power on distance (see Section 3.5.2). Therefore, we may assume that,

123

Multiuser environment: CDMA

thanks to the efficient power control, all Ak , k ¼ 1, 2, . . . , K are the same; in other words, the powers of all signals are identical and equal to P. Then an l th side-user noise-like signal whose energy is assumed to be uniformly spread over the bandwidth W creates extra noise power spectrum density Nl ¼ P/W added to the thermal noise spectrum. Since there are K 1 independent alien users altogether, the total MAI spectrum density is NI ¼ (K 1)Nl ¼ (K 1)P/W. Now we may determine the power SIR, i.e. signal-to-interference ratio q2I embracing both MAI and thermal noise: q2I ¼

2E 2E ¼ N0 þ NI N0 þ ðK 1Þ(P=W)

ð4:9Þ

Typically the number of users K or/and processing gain of every signature are large enough to enforce the mechanism of the central limit theorem and treat the second sum in (4.8) as a Gaussian random value. This justifies the Gaussian approximation of MAI used universally and meaning that all the results obtained in Chapter 2 for the classical reception problems (error probabilities, estimation precision etc.) are applicable to the similar multiuser problems after replacing SNR q2 by SIR q2I . For example, if data are transmitted by BPSK the bit error probability for any user is calculated via (2.19) where q2I substitutes for q2 ¼ 2E/N0 . Equation (4.9) makes it possible to estimate the maximal number of users which asynchronous CDMA can accommodate within the total time–frequency resource WT. It is readily seen that in the multiuser environment, absence of thermal noise does not lead to error-free decisions at the receiving side since MAI retains SIR finite and equal to so-called floor SIR: q2If ¼

ðK

2E ¼ 1Þ(P=W) ðK

2PT 2WT ¼ 1Þ(P=W) K 1

ð4:10Þ

The last result shows that the floor SIR and, hence, floor reception fidelity is exhaustively determined by the time–frequency product, i.e. spread spectrum processing gain WT and number of users. As long as inequality q2I  q2If is always true the maximal possible number of users may be limited by the relation: K

2WT þ1 q2I

ð4:11Þ

where q2I stands for the required SIR dictated by the necessary fidelity of reception in the analysed system. To be specific, consider a BPSK or QPSK data transmission system where the bit error probability should be provided no worse than Pe ¼ 10 2 . From (2.19) or Figure 3.16 (dashed line) it may be seen that in the no-fading case SIR of about 7 dB (q2I ¼ 5) is necessary to meet this demand. This produces the following estimate of the potential number of users: K

2WT þ1 5

ð4:12Þ

124

Spread Spectrum and CDMA

At the same time, FDMA is capable of accommodating WT users2 within the same total time–frequency resource (Wt ¼ W, Tt ¼ T), which is about 2.5 times greater than the right-hand side of (4.12). This leaves a rather bleak impression about the prospects of asynchronous CDMA in comparison to FDMA. In the next section, however, we will demonstrate that in the systems where the frequency resource needs to be reused in spatially distant areas (e.g. cellular ones), asynchronous CDMA significantly outperforms FDMA in the maximal number of users.

4.6 Asynchronous CDMA in the cellular networks 4.6.1 The resource reuse problem and cellular systems When creating a new commercial multiuser wireless system the system designer naturally intends to serve as many subscribers as possible, at the same time being tightly bound by some fundamental limitations. The first of these is the power constraint limiting the spatial zone covered by a single transmitter. The curvature of the Earth and fast attenuation of signal intensity with distance, which is characteristic of the UHF band utilized by systems akin to mobile radio (see Section 3.3), rule out a practical opportunity of covering zones whose radius exceeds tens of kilometres. Another tough restriction is imposed by the time–frequency resource, i.e. allocated spectrum band and data rate required. Take, for example, the physical layer bandwidth of cdmaOne (IS-95) Wt ¼ 1:25 MHz. With rate of encoded voice data R ¼ 19:2 bps and BPSK data modulation used in the downlink the potential number of active users according to (4.6) is K ¼ 130. This number is obviously too small for coverage of a densely populated urban area and this is all the more true if the service should also include high-speed (e.g. multimedia) data transmission along with a telephone connection. An effective way of getting around these obstructions is offered by a cellular network topology involving multiple base stations, each servicing its specific zone (cell) and covering collectively the total necessary area. The base station (BS) transmitter of relatively low power sends signals to the users (or mobile stations, MS), which are located within the served cell, and MS receivers form the downlink. The uplink includes the MS transmitters and BS receiver. All BS operate in strong coordination and the whole network has connections with fixed telephone and data transmission networks. When an MS moving across the system coverage zone leaves a current cell, the BS of the adjacent cell automatically takes over servicing this MS: this procedure is called handover. Within the framework of the cellular philosophy the wave attenuation manifests its favourable feature, allowing reuse of the same physical sub-channels (e.g. frequency sub-bands in FDMA or time slots in TDMA) by different transmitters, provided they are distant enough to secure a low level of their signals over the foreign coverage zones. As a result, just increasing the number of cells may flexibly solve the problem of raising the number of users and extension of a coverage area. In sparsely populated regions macrocells (measured by kilometres to tens of kilometres) may meet

2

We ignore here the potential doubling of the number of users by reuse of the same subcarrier frequency with a quadrature phase shift, since this opportunity is not feasible if different users are not time-synchronized.

125

Multiuser environment: CDMA

7 6 3

2 1 5 7

6 3 4 2 1

1 5 7 6 3

4 2 1 5 7

7

1 6 5 3 7 4 6 2 3

4 2 1 5

6 3 4

Figure 4.4 Cellular network configuration

coverage demands while in congested zones microcells (hundreds of metres) or even picocells (tens of metres) are likely to be necessary. It is universally accepted that an individual cell of a cellular network be approximated by a hexagon, owing to which the network pattern resembles a honeycomb (Figure 4.4). Let us estimate the efficiency of utilization of the time–frequency resource in a cellular system employing classical FDMA or TDMA multiple access schemes. To avoid unnecessary repetition and allowing for equivalence of FDMA and TDMA in number of users (Section 4.3), we will use only FDMA terminology. It is obvious that the cell radius cannot be bigger than the radius of total wave attenuation but the latter, as was pointed out, should be at least two times smaller than the distance between the centres of cells utilizing user signals with identical frequencies. If the first condition fails, MS near the edge of a cell will receive too weak a BS signal and contact with the BS will appear unreliable. Violation of the second condition will entail inter-cell interference, since again the MS travelling near the edge of the cell may receive along with the proper signal of its own BS the signal of an alien BS communicating with another MS (serviced by this alien BS) at the same frequency. In other words, the frequency sets of all cells around any specific cell should differ from the set used by the central cell. Thus, a configuration arises called a cluster within which no frequency set may be reused. A regular honeycomb structure where frequency alternation between cells meets the condition above may exist for only some specific sizes of cluster. The most typical is the seven-cell cluster highlighted in Figure 4.4. Hence, only one seventh of the total number of physical channels (frequencies) granted by the total time–frequency resource Wt Tt of the system may be utilized by a single cell. This gives the following estimation of the maximal number of users per cell in an FDMA or TDMA system: Kc ¼

Wt Tt 7

ð4:13Þ

where asynchronous operation typical of uplink is assumed. In the light of this result the pessimistic conclusion about the prospects of asynchronous CDMA made in the previous section needs a serious revision.

4.6.2 Number of users per cell in asynchronous CDMA Let us recall that asynchronous CDMA is spread spectrum based and every signature occupies the whole available time–frequency resource. Consider the uplink of a CDMA

126

Spread Spectrum and CDMA

cellular system in which all cells share the same frequency band with no distribution of the spectral resource between them. In other words, signatures of all cells, including adjacent ones, occupy the same spectral band, and the cluster consists of only a single cell. Clearly, the BS receiver of a specific cell will receive MAI not only from users of the cell but also from MS served by alien base stations. The natural question arises: how great is the contribution to the total MAI of the component caused by the MS transmitters of the outer cells? To estimate the intensity of this inter-cell MAI, look at Figure 4.5, where two contiguous cells C1 , C2 are approximated by circles of radius Dc . There are two BS marked as BS1 and BS2 and the MS within the zone of coverage of BS2. Despite the fact that the MS is served by BS2 its signal will also fall at the input of receiver BS1, contributing to the inter-cell MAI. Denote the distances from the MS to BS1 and BS2 as D1 and D2 , respectively, and recall that precise power control is essential for any asynchronous CDMA system to get around the near–far problem. Thanks to the control loop, the power of the signal received by BS2 from the MS is permanently maintained constant and equal to P. If the power transmitted by MS is Pt then according to the propagation model introduced in Section 3.5 P ¼ kPt /De2 . On the other hand, the signal propagating from MS to BS1 will suffer attenuation defined by the distance D1 , so that the power received by BS1 Pr1 ¼ kPt /De1 . We can use the previous equation to express Pr1 in terms of power P of the useful signal at its ‘own’ BS receiver input: Pr1 ðD2 ; Þ ¼



D2 D1

e

ð4:14Þ

P

where MS coordinates D2 ,  (see Figure 4.5) emphasize the dependence of Pr1 on the MS position inside C2 . Now average the result (4.14) over all the cell C2 assuming that all positions of MS within the cell are equally likely, i.e. joint PDF of the polar coordinates W(D2 , ) ¼ D2 /D2c inside C2 and zero outside. Then the mean power Pr1 of MAI created by a single alien MS from the neighbouring cell is:

Pr1 ¼

ZZ C2

P Pr1 ðD2 ; ÞWðD2 ; Þ dD2 d ¼ D2c

ZDc Z2 0

0

Deþ1 2 d dD2 : De1

MS D1

D2

BS1 C1

Figure 4.5

θ

BS2 Dc

C2

Dc

Computation of inter-cell MAI

127

Multiuser environment: CDMA

With attenuation exponent e ¼ 4 appropriate for many mobile communication scenarios, integration in the last equation may be completed analytically [20]. By the cosine theorem D21 ¼ (2Dc )2 þ D22 þ 2(2Dc )D2 cos  and: P Pr1 ¼ D2c

ZDc Z2 0

0

D52

2P d dD2 ¼ 2 2 2  ð4Dc þ D2 þ 4Dc D2 cos Þ

Z 1 Z 0

0

x5 ðx2 þ 4x cos  þ 4Þ2

d dx

The internal integral here may be evaluated by trigonometric substitution or found in tables (e.g. [21]), after which the integrand in x becomes (4x5 þ x7 )/(4 x2 )3 . Resorting again to the integral tables [21], we arrive at:  4 Pr1 ¼ P 16 ln 3

41 9



< 0:05P

This figure should be multiplied by the number of users per cell Kc and also by the number of adjacent cells surrounding the specific one. With hexagonal cell representation the latter is 6 and the total power of the inter-cell MAI induced by all adjacent cells is no greater than 6  0:05  Kc P ¼ 0:3Kc P. Strictly speaking, this estimation should be further incremented to cover inter-cell MAI from the more remote cells than just the neighbouring ones. However, it is quite predictable from the calculation above that this contribution will be negligible in comparison with the estimation just obtained [20]. Reserving some safety margin, we can therefore say that overall inter-cell MAI power PI, ext  0:5Kc P, while internal MAI created by Kc 1 ‘own’ mobiles has, as earlier, power PI, in ¼ (Kc 1)P. The floor SIR (4.10) may now be modified to allow for both internal and external MAI: q2If ¼

ðKc

2E 2WT ¼ 1Þ(P=W) þ 0:5Kc (P=W) 1:5Kc 1

ð4:15Þ

This result admits further revision for ‘pure’ telephoning, since in the dialogue every party does not talk continuously and spends some time reflecting and listening. Certainly, during such pauses the transmitter of a silent speaker may be switched off or at least operate at much lower power. Actually, this opportunity has already been exploited in 2G non-CDMA mobile telephone systems to extend battery lifetime. However, only in CDMA standards does it allow MAI to be reduced simultaneously, thereby, potentially increasing the number of users served by one cell. A typical figure for the voice activity factor, i.e. the fraction of total conversation time during which the phone speaker is talking, is 3/8. Correspondingly, weighting the average MAI power by this factor will transform the floor SIR above as follows: q2If ¼

16WT 4:5Kc 3

128

Spread Spectrum and CDMA

Solving this with respect to Kc gives a much more encouraging estimation of the number of users in CDMA as compared to the original one (4.12), obtained irrespective of a specific system topology: Kc 

32WT 2 þ 3 9q2If

ð4:16Þ

Substituting in (4.16) the former reference figure of 7 dB for the required SIR gives: Kc 

32WT 2 þ 45 3

ð4:17Þ

The estimation produced by this inequality is about five times greater in comparison with that of (4.13), the time–frequency resource being assumed the same. This shows that in cellular systems asynchronous CDMA is significantly more promising than the traditional orthogonal multiple access schemes FDMA and TDMA. Example 4.6.1. Suppose FDMA is used to provide multiple access within the bandwidth of 5 MHz typical of 3G systems. With the transmission rate of encoded speech 19.2 kbps and BPSK, up to Kc ¼ Wt /7R ¼ 37 users per cell may be potentially accommodated. At the same time, the asynchronous CDMA alternative, as follows from (4.17), is significantly better, allowing upto Kc ¼ 32W /45R þ 2/3  185 users to be served by a single cell site.

Estimations of the sort of (4.16) and (4.17) may seem excessively optimistic, since they ignore the thermal noise component. A practical situation to which they are more applicable implies that the power P transmitted by every mobile is so great that overall MAI dominates the AWGN noise. On the other hand, a designer may be interested in employing as low transmitted power as possible, e.g. for reasons of battery lifetime or electromagnetic compatibility. Returning to (4.15), adding AWGN spectrum density to the denominator and allowing again for the voice activity factor, it is easy to show that when a ‘pure’ (i.e. not covering MAI) power SNR is q2 and SIR q2I covering MAI plus noise is required, (4.16) changes to:   32WT q2I 2 ð4:18Þ 1 Kc  þ 3 q2 9q2I If, for example, an overall MAI power should be of the same level as noise power within the signal bandwidth then q2 ¼ 2q2I and: Kc 

16WT 2 þ 3 9q2I

ð4:19Þ

that is, about half of that calculated from the floor SIR (see (4.16)). For the required SIR specified as before (7 dB): Kc 

16WT 2 þ 45 3

ð4:20Þ

Multiuser environment: CDMA

129

Although with signal power reduction the number of users per cell dropped by two times, it nevertheless remained more than twofold greater than in FDMA or TDMA. One more merit of asynchronous CDMA is its favourable blocking character. In all real multiuser systems physical channels (frequency sub-bands in FDMA, time slots in TDMA, code signatures in CDMA) are not assigned to the customers once and for all. Instead, the network itself controls the bank of traffic channels and grants one of them to a user only when he requests access to the network. Of course, some system resource in this case should be reserved to arrange the request channel. In FDMA or TDMA systems the number of physical channels is fixed and from time to time blocking may happen, i.e. the situation where the network rejects a user’s request since all the channels are busy. A figure of about 2% is often assumed as tolerable probability of blocking and the number of channels should meet this requirement. Sometimes the pattern of distribution of subscribers over the network coverage area may change so seriously that at some cells blocking becomes intolerably probable. Then the network operator may face the challenge of reconfiguring the network, which entails frequency replanning affecting all cells. Scenarios typical of CDMA are critically different. First, if the number of users already active equals the nominal one calculated by (4.16) or (4.20), and one more request is received, it may be satisfied by assigning a signature which differs from those already employed. This will lead to some (as a rule slight) reduction of SIR and thereby quality of service for all active users. Therefore, instead of an outright denial a smooth blocking happens. Second, when in the course of time traffic in some area increases dramatically the operator may place an additional base station at the ‘hot spot’ without frequency replanning or any other radical affecting of the other cell sites. Based on the analysis of this chapter, the conclusion is justified that spread spectrum appears quite a flexible and efficient aid in providing multiple access. In particular, cellular systems are among those where the advantages of CDMA manifest themselves most persuasively.

Problems 4.1. A digital FDMA data transmission system should serve at least 100 users. Estimate the minimal total bandwidth occupied by the system if the necessary data rate per user is 20 kbps and BPSK is used as the data modulation mode. How will the bandwidth change if QPSK replaces BPSK? Answer the same questions if TDMA is preferred to FDMA. 4.2. An FDMA QPSK system is intended for digital data exchange between aircrafts and operates at frequencies around 3 GHz. The maximal vehicle velocity is 1800 km/h, master clock drift is 2  10 7 and the guard interval due to non-rectangular filtering is 1 kHz. Find the maximal number of users accommodated within the bandwidth 2.32 MHz if the necessary data rate per one user is 20 kbps. 4.3. A digital TDMA multiuser system should serve at least 100 users. The modulation mode is 8-PSK. Estimate the minimum bandwidth occupied by the system if the necessary transmission rate per user is 20 kbps. 4.4. A single uplink frequency subchannel of a TDMA BPSK digital cellular system is allowed to occupy bandwidth of 200 kHz. The time interval between consecutive

130

Spread Spectrum and CDMA

data bursts of every user should not be longer than 5 ms, the necessary data transmission rate per user is around 20 kbps and the maximal cell radius is 30 km. Find the maximal number of TDMA channels per frequency subchannel. 4.5. In a synchronous CDMA system 128 physical channels should be arranged. The data transmission mode is 8-PSK and the necessary rate per user is 20 kbps. Estimate the minimum bandwidth demanded. 4.6. A synchronous CDMA system has 50 physical channels operating in 16-PSK mode with a data rate of 20 kbps per user. The total bandwidth occupied is 500 kHz. What is the processing gain of the system? Can the system be free of MAI? What if the bandwidth were four times smaller? 4.7. There are two users within one cell of a cellular CDMA telephone system located at distances 500 m and 5 km from the base station. A more distant mobile emits power of 100 mW. Find the power emitted by the closer mobile under the assumption of perfect power control. 4.8. In the uplink of an IS-95 cellular telephone asynchronous CDMA is used. Data are transmitted at a rate of 28.8 kbps by means of orthogonal signals comprising 6-bit data blocks. The signal bandwidth can be assumed as 1.25 MHz. What is the number of users per cell if the minimum required SIR is 7 dB, voice activity factor is 3/8, external MAI adds 50% to internal interference and thermal noise is neglected. What will change if the SNR for thermal noise only is 9 dB? 4.9. Estimate the number of necessary cell sites under the conditions of Problem 4.8 (AWGN is not neglected) to service an area with 50 000 subscribers if the probability of the active state of a subscriber is 0.02. Compare the result with that for an FDMA system. 4.10. How will the potential number of users change if under the conditions of Problem 4.8 orthogonal 6-bit signalling is replaced by BPSK, the bandwidth and data rate remaining the same? 4.11. Based on the Ocumura–Hata model, prove that asynchronous CDMA is inoperative in a typical macrocell cellular system uplink without an effective power control. Neglect the thermal noise component. 4.12. There is synchronous downlink in a cellular CDMA system. Within one cell the maximal number of orthogonal signatures is used. If no time–frequency resource distribution between cells is involved, how can the effect of the surrounding base stations on the mobile receivers of the given cell be estimated? What would you recommend as a general approach to choosing signatures in such a system?

Matlab-based problems 4.13. Write a program illustrating the principle of FDMA. Example plots are shown in Figure 4.6. (a) Form the K  100 matrix of K subcarriers (K ¼ 2 10 is recommended). Take frequencies so that for each subcarrier the exact integer number of periods per 100 points is one greater than for the previous one. For the first one 4–6 periods are advised.

131

5

1

Group signal

1st user signal

Multiuser environment: CDMA

0 –1 0.5

1.0

1 0 –1 0

0.5

1.0

Kth user demod

Group signal

0

0

0.5

1.0 t/T

Figure 4.6

1.5

0

0.5

1.0

1.5

0

0.5

1.0

1.5

0

0.5

1.0 t/T

1.5

1 0 –1

1.5

5

–5

–5

1.5 1st user demod

Kth user signal

0

0

1 0 –1

Simulation of the principle of FDMA

(b) Take 2–3 random information bits for every subcarrier and perform BPSK modulation of all subcarriers. Plot the modulated signals for two selected users. (c) Sum all modulated signals to come to a group signal and plot that. (d) Demodulate each transmitted bit for every user, multiplying the group signal by a relevant subcarrier and then integrating over the bit duration. Plot selected demodulator outputs. Take decisions on the received bits for all users and compare them with the transmitted ones. (e) Run the program, changing the number of users, and interpret the results. 4.14. Use the program from Problem 4.13 to demonstrate the influence of inter-channel interference accompanying frequency drifts in an FDMA scheme. Enter a frequency shift of þ0:25 in the first subchannel and fix identical bit patterns in all subchannels. Reducing the amplitude of the first signal, note the value under which wrong decisions on the channel bits arise. Run the program, varying frequency drift and channel amplitudes, and comment on the results. 4.15. Write a program confirming experimentally equation (4.10) for the floor SIR in asynchronous CDMA. (a) Set N ¼ 50 80 and form the K  N binary matrix (taking on values 1) of independent random numbers. (b) Use the rows of the matrix as the signatures of K users. Assume the first of them is a useful one, the rest being interfering.

132

Spread Spectrum and CDMA

(c) Sum all rows except the first to simulate MAI. (d) Calculate output receive MAI as the inner product of the input MAI (item (c)) and the first signature. (e) Repeat items (a)–(d) 5000 times, calculate the variance of MAI and SIR, and compare them with the one evaluated by (4.10). What value of W should be used in (4.10) to make the experimental results fit the theoretical prediction? Give your explanation as to why WT ¼ N appears inappropriate. (f) Plot a histogram of MAI over all 5000 experiments and verify its closeness to the Gaussian PDF with an equal variance (Figure 4.7 presents example plots). (g) Run the program for combinations of N, K and check the validity of (4.12).

Number of values

600

400

200

0

–150

–100

–50

0

50

100

150

–150

–100

–50

0 MAI

50

100

150

Gaussian PDF

0.015

0.010

0.005

0

Figure 4.7

Histogram of MAI and its Gaussian approximation

4.16. Write a program illustrating the low contribution of outer mobiles to an overall MAI in an asynchronous cellular CDMA. Advised steps: (a) Set N ¼ 80 100 and number of users per cell K ¼ 20 25. (b) Using uniform random generator, form and plot internal MAI as the sum of K 1 random binary (consisting of elements 1) signatures of length N. (c) Form the 6K  2 matrix of random polar coordinates Dc ,  of outer mobiles (see Figure 4.4) to simulate uniform distribution of mobiles throughout a cell. Note that to realize this the angle should be uniformly distributed over [ , ], but the radius has to have linearly rising PDF. The latter is simulated by generation of uniformly distributed random numbers and afterwards taking their square roots.

133

Multiuser environment: CDMA

Figure 4.8

Random distribution of users over the surrounding cells

(d) Form the 6K dimensional vector of ratios of distances D2 (from an outer mobile to the BS serving it) and D1 (to the BS serving internal mobiles): D2 D2 ¼ qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi D1 2 4D2 þ D þ 4D D cos  c

2

c

2

where cell radius Dc may be set equal to 1.

(e) Form and plot the external MAI as sum of all outer signatures, each weighted with an amplitude attenuation factor. The latter is calculated on the basis of previous item with power attenuation exponent e ¼ 3:8 (see (4.14)). (f) Form and plot total MAI as the sum of the internal and external ones, and estimate the increase of the total MAI versus the internal one. (g) Produce a scatter plot demonstrating the random distribution of mobiles in outer cells (Figure 4.8 shows an example). (h) Run the program repeatedly for a range of N, K, compare the results with the theoretical prediction and give your comments.

5 Discrete spread spectrum signals

5.1 Spread spectrum modulation Let us revisit the general model (2.37) of a bandpass signal: sðtÞ ¼ Re½S_ ðtÞ expðj2f0 tފ; S_ ðtÞ ¼ SðtÞ exp½ jðtފ It is quite comprehensible that the spreading of a signal spectrum is accomplished by appropriate controlling of a signal complex envelope S_ (t), i.e. modulation of its instant amplitude S(t) and instant initial phase (t). As was observed in Chapter 1, ‘pure’ amplitude modulation cannot be an efficient tool for spectrum spreading, since it may remarkably widen the bandwidth only at the cost of concentrating the signal energy within short time intervals. As a matter of fact, this implies operating with short plain signals. On the contrary, angle (phase or frequency) modulation is capable of unlimited (at least in theory) widening of the spectrum with no effect on the distribution of the signal energy in time, i.e. signal duration, due to which its role in spread spectrum technology is fundamental. Amplitude modulation is just an auxiliary instrument, which sometimes appears to be useful in combination with angle modulation. Depending on the character of the modulation involved all spread spectrum signals may be classified into continuous and discrete ones. For the first, the modulation law, i.e. complex envelope S_ (t), is a continuous function of time, while the modulated parameters (amplitude, frequency, initial phase) of the second are piecewise constant and change by hops only at discrete time moments. The example of a continuous spread spectrum signal will be discussed briefly in Section 6.2; however, the main attention will be focused on discrete signals, owing to their predominant role in the majority of modern and forward-looking commercial systems.

Spread Spectrum and CDMA: Principles and Applications Ó 2005 John Wiley & Sons, Ltd

Valery P. Ipatov

136

Spread Spectrum and CDMA

5.2 General model and categorization of discrete signals Discrete signals considered in this book may be covered by the following description, generalizing the one already presented in Section 2.7.3: a discrete signal is a sequence of elementary pulses of a fixed form, recurring at some fixed time interval. The elementary pulse is called a chip. The complex envelope S_ 0 (t) defines its shape and internal angle modulation, if any. The time interval D between consecutive chips typically, but not compulsorily, equals or exceeds chip duration Dc . Modulation of the whole signal consists in manipulating the amplitudes, phases and, possibly, frequencies of individual chips. Accordingly, formal representation of the complex envelope of a discrete signal is given by the equation: S_ ðtÞ ¼

1 X

i¼ 1

ai S_ 0 ðt

ð5:1Þ

iDÞ expðj2Fi tÞ

where, in addition to the designations explained, ai and Fi are, respectively, complex amplitude and frequency (in terms of shift against the fixed central frequency) of the ith chip. It is obvious that the sequence fjai j, i ¼ . . . , 1, 0, 1, . . .g determines real amplitudes of chips, i.e. their amplitude modulation. Similarly, sequences fi ¼ arg ai , i ¼ . . . , 1, 0, 1, . . .g and fFi , i ¼ . . . , 1, 0, 1, . . .g define the laws of modulation of chip phases and frequencies. Figure 5.1 may be helpful in understanding some of the definitions above. Suppose that in the model (5.1) real amplitudes jai j may take on non-zero values only for 0  i  N 1 and jai j ¼ 0 for i < 0 and i  N. Putting it differently, the signal is a burst of a finite number N of manipulated chips. Such a signal we will call pulse or aperiodic. The duration of an aperiodic signal is T ¼ (N 1)D þ Dc . Another important case is a signal for which the modulation law repeats itself with a period of N chips: ai ¼ aiþN , Fi ¼ FiþN , i ¼ . . . , 1, 0, 1, . . .. For natural reasons, this sort of discrete signal is called periodic. Its real-time period is T ¼ ND and any periodic signal is just a repetition with period ND of an aperiodic one, the latter being a one-period segment of the periodic signal. In both cases we will call parameter N the length of a code sequence (see Section 2.7.3). Within the described general model we distinguish between several categories of discrete signals in accordance with a specific chip modulation mode.

ith chip

| ai | t



∆c

Figure 5.1

Example of a discrete signal

137

Discrete spread spectrum signals

1. If only the complex amplitudes of chips are manipulated, all frequencies remaining the same (Fi ¼ 0, i ¼ 0, 1, . . . , N 1), the signal is called an amplitude-phase shift keying (APSK) one. The conventional name of the sequence of chip complex amplitudes fai , i ¼ 0, . . . , N 1g is a code sequence or simply code. 2. If only the phases of chips in an APSK signal are manipulated, amplitudes being unchanged (jai j ¼ 1, i ¼ 0, 1, . . . , N 1), the signal is a PSK one. PSK signals are typical of so-called direct sequence spread spectrum systems (see Section 7.1). 3. Within PSK signals further categorization is possible depending on the modulation alphabet. When only binary complex amplitudes are involved (ai ¼ 1, or equivalently, jai j ¼ 1, i 2 f0, g, i ¼ 0, 1, . . . , N 1), the signal is a BPSK one; with a quaternary alphabet ai ¼ 1,  j, or equivalently, jai j ¼ 1, i 2 f0, ,  /2g, i ¼ 0, 1, . . . , N 1, the signal is QPSK etc. 4. If only the frequencies of chips are controlled, complex amplitudes remaining constant, the signal is of FSK type. A code sequence of such a signal is just a sequence of frequencies fFi , i ¼ 0, 1, . . . , N 1g. These signals are, in particular, employed in frequency hopping systems (see Section 7.1).

5.3 Correlation functions of APSK signals Correlation functions showing the likeness of time-shifted copies of signals are of critical importance in problems of time measurement and resolution (see Sections 2.11–2.16). The art of designing spread spectrum systems, as will be seen from the further discussion, is in many aspects the ability to find signals with adequate correlation properties. In this section we are deriving a general expression for the correlation functions of APSK signals. From the definitions above, the complex envelope of an APSK signal has the form: S_ ðtÞ ¼

1 X

i¼ 1

ai S_ 0 ðt

iDÞ

ð5:2Þ

Turn to the definition of normalized ACF (2.67), taking into account that for a periodic signal the integrand will also be periodic, and hence, its time-averaging (integration) may be accomplished over one period, normalization being made to the one-period energy. Therefore, with an assumption Dc  D mostly typical of applications,1 we are able to make use of the universal equation: 1 _ ð Þ ¼ E

ZT

S_ ðtÞS_  ðt

Þ dt

ð5:3Þ

0

1

The final results we will come to are valid regardless of whether or not this inequality is true. The assumption only helps to eliminate some secondary details in the derivation below.

138

Spread Spectrum and CDMA

for both aperiodic and periodic signals, where E ¼ kak2 E0 is complete energy for the first and per-period energy for the second. Here E0 stands for chip energy and kak is a geometric length norm) of the code vector a ¼ (a0 , a1 , . . . , aN 1 ); in other PN(Euclidean 1 words, kak2 ¼ i¼0 jai j2 is the energy of the N-element sequence fa0 , a1 , . . . , aN 1 g. Substituting (5.2) into (5.3) gives: T

_ ð Þ ¼

Z 1 1 X 1 X ai ak S_ 0 ðt E i¼ 1 k¼ 1

iDÞS_ 0 ðt

Þ dt

kD

0

T

Z 1 N X1 1 X  aa S_ 0 ðt ¼ E k¼ 1 i¼0 i k

iDÞS_ 0 ðt

kD

Þ dt

0

where the last equality follows from vanishing the integral, whenever i is beyond the set f0, 1, . . . , N 1g. Introducing the ACF of a single chip: 1 _ c ð Þ ¼ E0

Z1 1

S_ 0 ðtÞS_ 0 ðt

ð5:4Þ

Þdt

leads to: _ ð Þ ¼

1 X

k¼ 1

X1 1 N

kak2

ai ak

i¼0

Now change the summation index k to m ¼ i _ ð Þ ¼

1 X

m¼ 1

!

_ c ½

ði

kÞDŠ

k, arriving at:

ðmÞ_ c ð

mDÞ

ð5:5Þ

where: ðmÞ ¼

X1 1 N

kak 2

i¼0

ai ai

m

ð5:6Þ

is the ACF of the code sequence fa0 , a1 , . . . , aN 1 g characterizing its resemblance to its replica shifted by m positions. Equation (5.5) has quite an eloquent implication. Comparing it with the model (5.2) allows the observation that the ACF of an APSK signal is the APSK signal itself! The chip of the latter is the ACF _ c ( ) of the original chip, while the code sequence is the ACF (5.6) of the code sequence fa0 , a1 , . . . , aN 1 g of the original signal. Therefore, given the chip, the ACF of the APSK signal is entirely determined by the ACF (m) of the code sequence (or code ACF), and designing APSK signals with good autocorrelation properties means searching for sequences with good ACF. Note that, like any ACF, (m) at m ¼ 0 equals 1 and is even: (m) ¼  ( m).

139

Discrete spread spectrum signals

In multiuser CDMA systems families of discrete signals are necessary with special cross-correlation properties (see Section 4.5 and Chapter 7). Repeating accurately the derivation above but this time for two different (kth and lth) APSK signals having identical chips and lengths results in the following equation for their cross-correlation function (CCF): _ kl ð Þ ¼

1 X

m¼ 1

kl ðmÞ_ c ð

ð5:7Þ

mDÞ

where: kl ðmÞ ¼

N X1 1 a a kak kkal k i¼0 k;i l;i

ð5:8Þ

m

is the CCF of the code sequences fak, 0 , ak, 1 , . . . , ak, N 1 g, fal, 0 , al, 1 , . . ., al, N 1 g of the two signals, which shows the resemblance of the first to an m-shifted replica of the second. Certainly, CCF (5.7) is again the APSK signal whose code sequence is just the CCF of the two original codes (code CCF). Designing families with the necessary crosscorrelation properties means searching for the families of sequences having appropriate CCF. Equations (5.7) and (5.8) are most general, since the ACF of the kth signal is _ kk ( ) and the same is true for the code sequences. In what follows we will widely use the results obtained, sometimes omitting front factors in (5.6) and (5.8), i.e. operating with non-normalized correlation functions of code sequences: RðmÞ ¼

N X1 i¼0

ai ai m ; Rkl ðmÞ ¼

N X1

ak;i al;i

m

i¼0

ð5:9Þ

5.4 Calculating correlation functions of code sequences Consider the code sequence fa0 , a1 , . . . , aN 1 g. If it is used to generate a pulse signal, in the general model (5.2) ai ¼ 0 for negative i and i  N, so that according to (5.6) aperiodic or pulse ACF is calculated as: 8 X1 1 N > > > ai ai m ; m  0 > 2 < kak i¼m a ðmÞ ¼ NX 1þm > > 1 > > ai ai m ; m < 0 : kak2 i¼0

ð5:10Þ

The second row here is somewhat redundant since any ACF features evenness, and in particular, a ( m) ¼ a (m). As is seen, ignoring the normalizing factor, aperiodic ACF is an inner product of the vector a ¼ (a0 , a1 , . . . , aN 1 ) and its m-position non-cyclically shifted version. The latter is a shifted to the right (m  0) or to the left (m < 0) and only

140

Spread Spectrum and CDMA

the overlapping components of a and its shifted replica enter the sum in (5.10), all the rest are regarded as being forced to zero. For example, to calculate a (1) we first write, one above the other, the initial sequence and its copy conjugated and shifted to the right by one position, then compute all of their component-wise products and sum all the products: a0

a1

a2

a3

. . . aN

a0

a1

a2

. . . aN

1

a ð1Þ ¼

2

X1 1 N

kak2

ai ai

1

i¼1

Let us assume now that the signal is periodic, i.e. aiþN ¼ ai , i ¼ . . . , 1, 0, 1, . . .. Then (5.6) defines the periodic ACF p (m), the sum in which always contains N summands, since a 1 ¼ aN 1 , a 2 ¼ aN 2 , etc: p ðmÞ ¼

X1 1 N

k ak 2

ai ai

ð5:11Þ

m

i¼0

In this case the inner product is computed for the original code sequence and its cyclically shifted copy, where under m  0 m left ‘empty’ positions are filled with symbols pushed out rightward. For instance, a scheme of calculating p (1) looks like this: a0 aN

1

a1

a2

a3

. . . aN

1

a0

a1

a2

. . . aN

2

p ð1Þ ¼

X1 1 N

k ak 2

ai ai

1

i¼0

Since p (m) is calculated under the assumption of periodicity of a code sequence, it is periodic itself with period N, i.e. p (m) ¼ p (m þ N), m ¼ . . . , 1, 0, 1, . . ., which stems directly from (5.11) and, in its turn, reformulates the evenness property as: mÞ ¼ p ðm

p ð mÞ ¼ p ðN



ð5:12Þ

This equation shows that p (m) is entirely characterized by its values at only shifts   N m ¼ 1; 2; . . . ; ; 2 where bc symbolizes rounding towards zero. Another important property of the periodic ACF follows from (5.11) after splitting its sum into two: p ðmÞ ¼

X1 1 N

kak2

i¼m

ai ai

m

þ

m 1 1 X

kak2

i¼0

ai ai m ; m  0

The first term here is aperiodic ACF a (m) (see (5.10)), while the second equals a (m N), which is again verified immediately from (5.10) by calculating a (m N) according to its second row. This produces the equality associating the periodic and aperiodic ACF: p ðmÞ ¼ a ðmÞ þ a ðm

NÞ; m ¼ 0; 1; . . . ; N

ð5:13Þ

141

Discrete spread spectrum signals

Equation (5.13) plays quite a crucial role in the synthesis of pulse signals with good autocorrelation properties (see Section 6.10). Example 5.4.1. Table 5.1 illustrates the technique of computing aperiodic and periodic ACF by the example of a binary sequence of length N ¼ 8fþ þ þ þ g. In the table the binary

Table 5.1 Computation of ACF of the sequence of length 8 m

a0

a1

a2

a3

a4

a5

a6

a7

Ra(m)

Rp(m)

0 1

+ –

+ +

+ +

– +

– –

+ –

– +

– –

+8 +1

+8

2





+

+

+





+

–2

–4

3

+





+

+

+





+1

0

4



+





+

+

+



0

0

5





+





+

+

+

–1

0

6

+





+





+

+

–2

–4

7

+

+





+





+

–1

0

0

code symbols þ1 and 1 are designated by just ‘þ’ and ‘ ’, respectively, as is usually done. Non-normalized ACF is presented and the shading marks the symbols that are ignored in the calculation of the aperiodic ACF. The results after normalization are also used in Figure 5.2, where the autocorrelation functions of the APSK signal with a rectangular chip of duration

1.0 .

ρp(τ)

0.8 0.6 .

0.4

ρa(τ – T)

.

ρa(τ)

0.2 0.0 –0.2 –0.4 0

Figure 5.2

2

4

6

8 τ/∆

10

12

14

16

Autocorrelation functions of the binary signal of length 8

142

Spread Spectrum and CDMA

Dc ¼ D and the considered code sequence are built. The solid, dashed and dotted-dashed lines present the periodic ACF _ p ( ) and shifted copies _ a ( ), _ a ( T ) of the aperiodic ACF, respectively. Certainly, the plots confirm the validity of (5.12) and (5.13).

When the CCF of two sequences of the same length is calculated we again may discriminate between the aperiodic CCF a, kl (m) and the periodic one p, kl (m) found as: 8 NP1 > 1 > > ak;i al;i m ; m  0 > kak kkal k < i¼m a;kl ðmÞ ¼ ð5:14Þ > Nþm > P1 > 1  > ak;i al;i m ; m < 0 : kak kkal k i¼0

and:

p;kl ðmÞ ¼

N X1 1 a a kak kkal k i¼0 k;i l;i

ð5:15Þ

m

Equation (5.13) still stands for CCF: p;kl ðmÞ ¼ a;kl ðmÞ þ a;kl ðm

ð5:16Þ



but as for the evenness or unity value at m ¼ 0, those, certainly, are no longer inherent features of an arbitrary CCF as they were of any ACF.

5.5 Correlation functions of FSK signals Let us perform the same work as in the two previous sections but now in application to FSK signals. Following the definition of Section 5.2, a complex envelope of an FSK signal assumes the form: S_ ðtÞ ¼

1 X

i¼ 1

ai S_ 0 ðt

ð5:17Þ

iDÞ expðj2Fi tÞ

where in the case of a periodic signal all ai equal one, while for a pulse signal of length N ai ¼ 1, 0  i < N and ai ¼ 0 beyond the range 0  i < N. Regardless of the periodicity or finiteness of the signal, we again, with the same reasoning as before, may exploit a universal expression of ACF: 1 _ ð Þ ¼ NE0

ZT

S_ ðtÞS_  ðt

Þ dt

0

T

Z 1 X1 X 1 N ¼ ai ak expðj2Fk Þ S_ 0 ðt NE0 i¼0 k¼ 1 0

iDÞS_ 0 ðt

kD

Þ exp½ j2ðFi

Fk ÞtŠ dt

143

Discrete spread spectrum signals

where use is made of the fact that all chips with non-zero amplitudes now have equal energies E0 , i.e. kak2 ¼ N and E ¼ NE0 . It is typical of FSK modulation to use a uniform frequency alphabet so that Fi 2 f0, F, 2F, . . .g, where the frequency step F is no smaller than the chip bandwidth. Thus, the spectra of two chips having frequencies Fi and Fk do not overlap and the chips are orthogonal independently of their time mismatch (see Section 4.4), whenever Fi 6¼ Fk . Allowing for this fact, we arrive at: _ ð Þ ¼ ¼

1 N X1 1 X ai ak expð j2Fk ÞðFi N k¼ 1 i¼0 N 1 X1 1 X ai ai N m0 ¼ 1 i¼0

m0

Fk Þ_ c ½

expð j2Fi ÞðFi

Fi

ði

kÞDŠ

m0 Þ_ c ð

m0 DÞ

ð5:18Þ

where _ c (  ) is, as before, chip ACF and: yÞ ¼

ðx



1; x ¼ y 0; x ¼ 6 y

Unlike APSK signals, ACF (5.18) in the general case cannot be further simplified to a form similar to (5.5). It is common practise to analyse the behaviour of the ACF of FSK signals primarily at the delays, which are multiples of the chip duration: ¼ mD, where m is integer. Assuming that the integer number of periods l of each frequency fits in the chip duration (FD ¼ l) and taking into account that _ c (0) ¼ 1, _ c ( ) ¼ 0, j j  D, substitution of ¼ mD into (5.18) leaves only one non-zero addend of the sum in m corresponding to m0 ¼ m, so that: _ ðmDÞ ¼

X1 1N ai ai N i¼0

m ðFi

Fi



ð5:19Þ

When the signal is finite and m  0, all summands possessing indexes beyond the range m, m þ 1, . . . , N 1 disappear, and the aperiodic ACF of the FSK signal _ (mD) ¼ a (m) assumes the form: a ðmÞ ¼

X1 1N ðFi N i¼m

Fi

m Þ;

m  0; a ð mÞ ¼ a ðmÞ

ð5:20Þ

where complex conjugation in the second equation (expressing evenness) is needless, since _ (mD) is always real-valued. In the case of signal periodicity no zero products ai ai m enter the sum of (5.19) and the periodic ACF of the signal in question _ (mD) ¼ p (m) looks as follows: p ðmÞ ¼

X1 1N ðFi N i¼0

Fi



ð5:21Þ

144

Spread Spectrum and CDMA

The sums in (5.20) and (5.21) just accumulate the number of coincident frequencies in the FSK signal and its replica time-shifted by m chip positions. Therefore, to compute ACF of an FSK signal at the point mD, it is quite enough to count the number of pairs fFi , Fi m g with equal Fi and Fi m , where i runs over the ranges fm, m þ 1, . . . , N 1g (aperiodic ACF, m  0) or f0, 1, . . . , N 1g (periodic ACF). Clearly, equation (5.13), linking together periodic and aperiodic ACF, remains valid for FSK signals. One widely used way to represent an FSK signal is as an M  N array where the horizontal and vertical directions are assigned to time and frequency, respectively, and M is the size of the frequency alphabet (i.e. the number of frequencies used in modulation). In the ith vertical column of this array only a single entry is labelled (e.g. by a point or shading), which corresponds to a frequency of an ith chip. Then to calculate aperiodic ACF at any specific m we just sum the number of labelled pairs along all rows having distance m and normalize the result if necessary. If periodic ACF is of interest, the sums above obtained for m and N m should be summed together. Example 5.5.1. Figure 5.3 shows the modulation law of an FSK signal of length N ¼ 8 with 7 P (Fi Fi m ) has values 8, 1, 1, 0, N ¼ 8, M ¼ 5. Its non-normalized aperiodic ACF Ra (m) ¼ i¼m

Figure 5.3

FSK signal with N ¼ 8, M ¼ 5

1, 0, 0, 0 corresponding to m ¼ 0, 1, . . . , 7, since there is one labelled pair along one line at distance 1, one such pair at distance 2, etc. Directly from (5.13), the values of non-normalized periodic ACF may be found as 8, 1, 1, 0, 2, 0, 1, 1.

Generalization of results (5.19) and (5.20) onto CCF can be done without trouble merely by adjusting the designations:

a;kl ðmÞ ¼

p;kl ðmÞ ¼

8 1 NP1 > > ðFk;i > > > < N i¼m

Fl;i

> > > P1 1 Nþm > > ðFk;i : N i¼0 X1 1N ðFk;i N i¼0

Fl;i

m Þ;

m0 ð5:22Þ

Fl;i



m Þ;

m ns is called oversaturated, emphasizing that the excessive number of code vectors involved excludes the chance of their orthogonality (possibly a weak one). The opportunity and algorithm for obtaining the minimum distance equal to the upper limit (7.17) in an oversaturated system was proved in [56]. To discuss the idea more transparently and simplify the notation, let us first ignore the opportunity for doubling the signal space dimension due to a quadrature splitting, putting ns ¼ N. Let us take N orthonormal N-dimensional vectors ak , k ¼ 1, 2, . . . , N; (ak , al ) ¼ kl , and add to them one more vector built as: N 1 X aNþ1 ¼ pffiffiffiffi ak N k¼1

ð7:20Þ

Using N þ 1 vectors ak , k ¼ 1, 2, . . . , N þ 1 thus obtained to form K ¼ N þ 1 signatures according to (7.12), we have the N þ 1th signature: N 1 X S_ k ðtÞ SNþ1 ðtÞ ¼ pffiffiffiffi N k¼1

and, modulating all the signatures by binary data symbols bk ¼ 1, a group signal: S_ ðt; bÞ ¼ ¼

Nþ1 X k¼1

bk S_ k ðtÞ ¼

N X

N X

N X 1 S_ k ðtÞ bk S_ k ðtÞ þ pffiffiffiffi bNþ1 N k¼1 k¼1

1 ðbk þ pffiffiffiffi bNþ1 ÞS_ k ðtÞ: N k¼1

ð7:21Þ

The difference between the two versions of the group signal corresponding to two bit patterns b ¼ (b1 , b2 , . . . , bNþ1 ), b0 ¼ (b01 , b02 , . . . , b0Nþ1 ) is: S_ ðt; bÞ

S_ ðt; b0 Þ ¼

N  X k¼1

 1 "k þ pffiffiffiffi "Nþ1 S_ k ðtÞ; "k ¼ bk N

b0k ¼ 0; 2

Using the same technique as in (7.15) and the orthogonality of the first N signatures, we arrive at:  d 2 ðb; b0 Þ ¼ S_ ðt; bÞ

2 N  X 2 1 S_ ðt; b0 Þ ¼ Eb "k þ pffiffiffiffi "Nþ1 N k¼1

ð7:22Þ

219

Spread spectrum signature ensembles

Since the bit patterns b, b0 are different, at least one of "k , k ¼ 1, 2, . . . , N þ 1 is nonzero, i.e. equals 2. If "Nþ1 ¼ 0 then such an "k is present among "1 , "2 , . . . , "N and d 2 (b, b0 )  4Eb . If "Nþ1 ¼p2, ¼0p equal ffiffiffiffi 4/N, ffiffiffiffi then the summands in (7.22) with "k

while all the rest are 4( N  1)2 /N, resulting in d 2 (b, b0 )  4Eb min 1, ( N 1)2 . Combining these results we come to the estimate of the minimum squared distance from below:

2 dmin



pffiffiffiffi  min 4Eb ; 4 N

2

1 Eb



¼

8 pffiffiffiffi 0 are zeros (bits of b, b0 on all the supplementary signatures are identical), then at least one of "0k equals 2 and d 2 (b, b0 )  4Eb . If u is a maximal layer number for which "um ¼ 2, u > 0, then a summand of (7.24) containing "um may be presented as:

2  1  u 2 x0  2u 1 x1      2xu 1  1

4u 1

where xs ¼ "sn /2 ¼ 0, 1, s ¼ 0, 1, . . . , u 1. The number in the round brackets of the modulus above is always even so the squared modulus is never smaller than one. Since there are exactly 4u terms in (7.24) entered by "um with any fixed m, we come to an estimation d 2 (b, b0 )  4u Eb /4u 1 ¼ 4Eb , proving that the oversaturated ensemble of this sort does not reduce the minimum distance of the primary orthogonal set. In its general form the procedure described does not guarantee that the supplementary code sequences (7.23) obtained from the binary primary sequences will also be binary. To meet this latter demand, a version of the procedure may be used [57] in which primary sequences are generated as rows of the lth Kronecker power of the 4th order Hadamard matrix having an odd number of plus ones in any column. Example 7.2.1. Let us build up an oversaturated ensemble of binary signatures of length N ¼ 16 ¼ 42 . According to the scheme just discussed, 5 supplementary orthogonal signatures may be added to the N ¼ 16 primary ones (four at layer s ¼ 1 and one at layer s ¼ 2) providing total number of users K ¼ 21. In order to have all signatures binary take the Hadamard matrix:

2

þ

6 H4 ¼ 6 4þ þ

þ þ þ þ

3 þ þ7 7 5 þ

having one or three plus ones in its columns and form its Kronecker square:

H16

2

H4 6 H4 ¼ H4 H4 ¼ 6 4 H4 H4

H4 H4 H4 H4

H4 H4 H4 H4

3 H4 H4 7 7 H4 5 H4

222

Spread Spectrum and CDMA

Primary signatures are just rows of this matrix, i.e. in the normalized form:

 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 T a0 ; a1 ; a2 ; a3 ; a4 ; a5 ; a6 ; a7 ; a8 ; a9 ; a10 ; a11 ; a12 ; a13 ; a14 ; a15 ¼ 0

þ þ þ B þ B B Bþ þ B Bþ B B B B Bþ þ B B B þ B B þ þ 1B ¼ B 4Bþ þ þ B B þ B B Bþ þ B Bþ B B Bþ þ þ B B þ B B @þ þ þ

þ þ þ þ

þ þ þ þ

þ þ

þ

þ

þ þ þ þ þ

þ þ þ

þ þ

þ þ þ

þ þ þ þ þ

þ þ

þ þ þ þ

þ þ þ

þ þ þ

þ þ þ þ

þ þ

þ þ þ þ þ

þ

þ þ

þ þ þ þ þ þ þ

þ

þ

þ þ þ þ

þ þ

þ þ

þ

þ

þ

þ þ

þ þ þ þ þ

þ þ

þ þ

þ þ þ

1 þ þ þ þC C C C þ C þC C C þ þC C þ þC C C C þ C þC C C C C C C C þC C C þ C C þ þC C þ þC C C A þ þ

Applying (7.23) to the rows of this matrix gives five supplementary binary signatures:

0 1 þ a10 B B a1 C B 11 C 1 B Ba C ¼ Bþ B 2C 4B @þ @ a1 A 3 2 þ a0 0

þ

þ

þ þ

þ þ þ

þ þ þ

þ þ þ þ

þ þ

þ þ þ þ

þ

þ þ þ þ þ þ þ þ

þ þ þ þ

þ

þ þ þ þ

1 þ þC C C C þA þ

It may be quite a challenge for the reader to check the minimum distance property of this oversaturated ensemble.

Let us remind ourselves that the criterion of minimum distance is adequate (at least asymptotically) whenever multiuser reception is affordable. Up to this point we have not worried about the multiuser receiver complexity. For the case of non-oversaturated systems (K  N) this is not a critical matter, since—the orthogonal ensemble being optimal—multiuser reception degenerates in this case to a single-user one (see Section 4.1). On the other hand, when an oversaturated system is analysed, the opportunities for simplifying the multiuser algorithm at the cost of proper design of signatures are very important. One way to realize this approach again exploits the idea of splitting the overall N-dimensional signal space into orthogonal subspaces of smaller dimension n. However, in contrast with what was discussed above, every subspace is further

223

Spread spectrum signature ensembles

oversaturated autonomously, providing n þ nov signatures, so that all signatures from different subspaces remain orthogonal. The reason for so doing is to split an overall multiuser algorithm into N/n parallel ones, each operating in the n-dimensional subspace independently of the others. With a moderate n these partial algorithms are simple, making the whole receiver structure technologically feasible. The total number of users achievable in such a system is:

N nov  ðn þ nov Þ ¼ N 1 þ n n

The problem of optimizing an ensemble of this sort is in a sense non-trivial, and just adding nov supplementary signatures to the n primary orthogonal ones does not solve it. We refer the curious reader to [58,59] for details. Another alternative is the design of signature ensembles allowing implementation of multiuser algorithms in various computational-effective iterative forms [60,61].

7.2.3 Welch-bound sequences Let us get down to another scenario, where a priori tough limitation on the receiver complexity makes acceptable only the simplest, i.e. single-user or conventional, reception algorithm. In this case a decision b^k on the current data symbol bk of the kth user is defined only by correlation (7.8), as though no interference except AWGN is present at the receiver input. With no loss of generality, we may admit that a current symbol is received at the interval (0,T] and put delay k and phase k in (7.8) equal to zero: z_k ¼

ZT

 Y_ ðtÞS_ k ðtÞdt

ð7:25Þ

0

When all signatures are perfectly synchronized and their number K does not exceed N, orthogonal signatures are again the best choice, since they make a single-user algorithm identical to a multiuser (ML) one. Certainly, no MAI arises in this case so ignoring all the signals of the other users does not undermine the receiver optimality. In contrast to this, the case of an oversaturated (K > N) system is of separate interest, because all signatures then cannot be orthogonal and MAI is unavoidable. Returning to (7.11), let us present the observed complex envelope as: Y_ ðtÞ ¼ S_ ðt; b0 Þ þ N_ ðtÞ ¼

K X l¼1

b0l S_ l ðtÞ þ N_ ðtÞ

where N_ (t) is the noise complex envelope and designation b0 ¼ (b01 , b02 , . . . , b0K ) symbolizes again (as in (4.8)) the genuine (i.e. unknown at the receiver) data pattern transmitted by K users to distinguish it from the one b ¼ (b1 , b2 , . . . , bK ) hypothesized in the course of the decision. After substituting this into (7.25) we obtain: z_k ¼ 2b0k E þ 2E

K X l¼1 l6¼k

b0l _ lk þ

ZT 0

 N_ ðtÞS_ k ðtÞdt

ð7:26Þ

224

Spread Spectrum and CDMA

2 RT  where E ¼ 12 0 S_ k (t) dt is (assumed the same for all users) the signature energy per one transmitted symbol, and _ lk ¼ _ kl is, as always, the correlation coefficient of the complex envelopes of the lth and kth signatures. The second term of (7.26) presents MAI, i.e. mutual interference created by the alien signals at the output of the receiver ‘tuned’ to the kth user signal. Each summand b0l _ lk of the sum in l (i.e. the contribution to total 0 MAI of the lth user signal) is random  0  due to the randomness of users’ data symbols bl .   For any PSK, data modulation bl ¼ 1 and average power (variance) of each contribution to MAI is 4E 2 j_ lk j2 . Naturally, all the users transmit their data independently, so that the total average power (variance) of MAI PIk at the kth receiver output is a sum in l of the powers of individual contributors: PIk ¼ 4E 2

K X l¼1 l6¼k

j_ kl j2

Since this quantity evaluates the power of MAI for only the kth user receiver, to cover the whole system we may sum it in k, coming to the result:

PI ¼

K X k¼1

PIk ¼ 4E 2

K X K X k¼1

l¼1 l6¼k

j_ kl j2

ð7:27Þ

Now we may see that an adequate criterion of optimizing synchronous signatures, single-user reception postulated, is the minimum of the total MAI power or, equivalently, the sum of squared correlations in the expression above. Of course, again for the case K  N, the orthogonal signature set creates no MAI, i.e. turns this sum into zero so that only oversaturated ensembles are of a special interest. The criterion just introduced typically emerges in the literature as the minimum of the total squared correlation (TSC):

TSC ¼

K K X X k¼1 l¼1

j_ kl j2 ¼ min

ð7:28Þ

which does not differ from the original one, since the sum in it is greater than the one in (7.27) by a constant K (_ kk ¼ 1). There is a fundamental lower limit on the TSC known as the Welch bound [62]. Let us derive it, expressing first the correlation coefficients in terms of elements ak, i of the signature code sequences. Assuming all code sequence vectors ak ¼ (ak, 0 , ak, 1 , . . . , ak, N 1 ) normalized so that kak k2 ¼ N, (7.19) gives: _ kl ¼

X1 ðS_ k ; S_ l Þ ðS_ k ; S_ l Þ ðak ; al Þ 1 N ¼ ¼ ak;i al;i ¼ 2E 2kak kkal kE0 N N i¼0

225

Spread spectrum signature ensembles

Substituting this into the definition of TSC in (7.28) results in:

TSC ¼

K X K N X1 N X1 1 X ak;i al;i ak;j al;j N 2 k¼1 l¼1 i¼0 j¼0

2   K K K X1 N X X1 N X1 X X1 X 1 N 1 N     ¼ 2 ak;i ak;j ak;i ak;j  al;i al;j ¼ 2   N i¼0 j¼0 k¼1 N i¼0 j¼0  k¼1 l¼1

Since summands in i, j are all non-negative, omitting those with different i, j never increases the sum, so that: K  X1 X  1 N ak;i 2 TSC  2 N i¼0 k¼1

!2

ð7:29Þ

To come to the final result one may further use the Schwarz inequality, but this step becomes unnecessary in the most interesting case of PSK signatures. For any PSK alphabet jak, i j ¼ 1, which concludes the derivation of the Welch bound: K X1 X 1 N TSC  2 1 N i¼0 k¼1

!2

¼

K2 N

In the absence of oversaturation (K  N) the straightforward corollary of definition (7.28) is a tighter bound, based on the fact that with orthogonal signatures all summands in (7.28) with unequal k, l vanish and TSC achieves its minimum equal to K. Combining the results brings about the following general form of the Welch bound:

TSC 

8 > K; K  N >
K2 > : ;K > N N

ð7:30Þ

Certainly, the set of sequences achieving (7.30) (Welch-bound sequences) is the best possible in total MAI criterion for a single-user receiver. But in fact, the significance of these sets goes far beyond only this feature, since Welch-bound sequences maximize the Shannon capacity of CDMA channels with AWGN and Gaussian input, the latter constraint losing its importance whenever a receive symbol SNR becomes small enough. Details of the proof of this remarkable property can be found in [63]. Since TSC includes K squared correlations of vectors with themselves, each equalling one, the difference TSC K covers only unwanted correlations between non-coinciding

226

Spread Spectrum and CDMA

vectors, which we are interested to have as small as possible. There are K(K vector pairs entering TSC, so that average squared correlation 2 per pair is: 2 ¼

TSC KðK

1) such

K 1Þ

giving, together with (7.30), the lower bound on this parameter:

2 

8 > < 0; K  N

K N > : ; K N NðK 1Þ

ð7:31Þ

From the way of obtaining (7.30), we may deduce how to come to the Welch boundensemble. Of course, only a non-trivial case of oversaturation should be discussed, since ways of generating orthogonal sequences have been considered previously. First of all, equality in (7.29) is a sufficient (and, of course, necessary) condition of equality in (7.30), or, considering the equation preceding (7.29), sequences for which: K X k¼1

ak;i ak;j ¼ 0; i 6¼ j

ð7:32Þ

are Welch-bound sequences. Suppose all vectors a1 , a2 , . . . , aK of signature code sequences are written as columns of an N  K signature matrix A: 2

a1;0 6 a1;1 A ¼ ½ a1 a2 . . . aK Š ¼ 6 4 ... a1;N 1

a2;0 a2;1 ... a2;N

1

3 ... aK;0 ... aK;1 7 7 ... ... 5 . . . aK;N 1

then (7.32) means nothing but orthogonality of the rows of A. Therefore, to build up an oversaturated (K > N) ensemble of Welch-bound sequences, one should just construct an N  K matrix A with orthogonal rows. Since the dimension of rows of such a matrix is greater than their number, there is no principal prohibition on its existence. Then the desired sequences are simply columns of A. We may now estimate the floor (i.e. noise-neglected) SIR for an oversaturated Welchbound ensemble. The total MAI power PI may be found from (7.27) and (7.28) as PI ¼ 4E 2 (TSC K). Since this quantity is MAI summed over K single-user receivers, an average output MAI power per receiver will be PIk ¼ PI /K. The useful (i.e. caused by the kth signature) effect at the kth receiver output expressed by the first term of (7.26) has power 4E 2 (PSK modulation assumed), so that the floor power SIR with respect to an average MAI power according to (7.30) is: 4E 2 K N ¼ q2I ¼  ¼ TSC K K N PIk

ð7:33Þ

227

Spread spectrum signature ensembles

Example 7.2.2. Let us construct the binary Welch-bound ensemble of K ¼ 16 sequences of length N ¼ 14. For this we may make use of the matrix H16 of Example 7.2.1 and discard two arbitrary (e.g. the last two) rows. The matrix A obtained this way is exactly what is needed, and its 16 columns are Welch-bound signatures of length 14. TSC for the ensemble thus found equates accurately to its minimum value determined by (7.30): TSC ¼

K 2 256 ¼ 14 N

The floor SIR estimated with respect to average MAI power per receiver is according to (7.33) qI2 ¼ N/(K N) ¼ 7.

If belonging to a PSK alphabet is the only restriction on the signature code sequences, then the algorithm for constructing Welch-bound sets described above works universally. For example, rows of the matrix A may always be taken as K cyclically shifted replicas of the Chu sequence of length K. As was shown in Section 6.11.2, Chu codes exist for any length and all their different cyclic replicas are orthogonal. On the other hand, when all signatures should be binary (ak, i ¼ 1) orthogonality of all N rows of the matrix A with N > 2 is possible only for K divisible by four (see Problem 7.14). This implies that for K 6¼ 0 mod4 binary signatures the Welch bound (7.30) is not tight, and more precise lower borders should exist. Derivations of them may be found in [64,65] (see also Problem 7.17).

7.3 Approaches to designing signature ensembles for asynchronous DS CDMA Let us extend the issue of signature design to the case of asynchronous DS CDMA, where time and phase shifts between individual user signals are random. On the assumption of employing a single-user receiver, the decision on the current symbol of the kth user is again done on the basis of correlation (7.25). Now, however, a tough alignment between the boundaries of data symbols and the chips of different users is not maintained due to arbitrary mutual time shifts of users’ signals. Suppose that the kth user data receiver is explored and l is the delay of the lth signal against the kth signal. In order to concentrate only on the issue of designing signature codes let us assume that chip boundaries of all K signatures are synchronized, i.e. mutual delays are multiples of D: l ¼ nl D, where nl is integer, 0  nl < N. Then the situation is well explained by Figure 7.15 (for k ¼ 1), stressing that in asynchronous CDMA, unlike synchronous (see Figure 7.13), data symbols of other users may change during the reception of the kth user’s current data symbol. Still the main factor making design of asynchronous signature sets harder is the necessity to distinguish every signature from all possible shifted replicas of the others, which is not necessary in synchronous CDMA. Suppose first that no change of data symbols of all users happens during the received symbol of the kth user, i.e. bl, i 1 ¼ bl , l ¼ 2, 3, . . . , K. Then the situation is different from the synchronous one only in the mutual time-mismatch of signatures. Start with the assumption that the signature period L coincides with the processing gain N, which

228

Spread Spectrum and CDMA

b1,i – 1 a1,0

1st user

a1,1

a1,2

a1,N– 2

b2,i – 1

a1,N– 1 t

b2,i a2,– 2

2nd user

b1,i + 1

b1,i

a2,– 1

a2,0

a2,1

a2,2 t

τ2 bK,i

bK,i – 1 Kth user

aK,– 2

aK,– 1

aK,0

τK

aK,1 t N∆

Figure 7.15 Datastreams and signatures in asynchronous CDMA

is the number of chips per data symbol duration or, equivalently, of chips integrated in the correlator. If no restriction is imposed on the possible range of mutual delays, the lth signature may be presented by any of its N cyclically shifted replicas, so that there are N(K 1) different N-dimensional vectors, each of which is a potential source of MAI in the kth receiver. When a channel is subject to multipath effects every cyclic replica of the kth signal may also create interference at the kth receiver. Let us admit that up to N 1 such replicas may exist, i.e. the multipath delay spread ranges up to the period of the signature. Another reason to include the cyclic replicas in the explored vector set is a desire to have low autocorrelation sidelobes, which is important in the search problem (see Section 8.2). With such an extension we have a total of KN vectors, whose correlations should be as small as possible. The Welch bound is again a good instrument to estimate the lower limit of the average squared correlation 2 of those KN vectors. For that it is enough to replace K by KN in (7.31). Since KN > N for any K  2 this gives: 2 

K 1 KN 1

ð7:34Þ

This inequality shows the fundamental lower limit, which an average squared correlation between all cyclic replicas of all K signatures of length N (own replicas of each one included) can never fall below. When the number of users is about ten or more this version of the Welch bound becomes especially simple: 2 

1 ;K  1 N

ð7:35Þ

Suppose now that the signature period in the number of L chips covers several data symbols L > N and data of no user changes during the kth current data symbol, as

229

Spread spectrum signature ensembles

before.1 Again, let the delays range up to the signature period. Since the number of chips per data symbol (integration interval) remains N, we, as previously, deal with N-dimensional vectors, but the number of vectors whose correlations are controlled is now KL instead of KN, so that the bound stems from (7.31): 2 

KL N NðKL 1Þ

ð7:36Þ

which again turns into (7.35) with K  1. The last result makes it possible to demonstrate that data modulation can in no way lower the bounds obtained. Indeed, every data-modulated signature may be considered as a new sequence of some (possibly very big) period Lk . Then all modulated signatures will have a common period L, being a least common multiple of all Lk , and the average squared correlation will be bordered from below by (7.36), again meaning that (7.35) is valid for the case of many users. The derivations just undertaken establish a criterion of asynchronous signature set design: the ensemble of many signatures may be considered appropriate if its average squared correlation is close to the bound (7.35). Let us demonstrate that ensembles of random signatures attain this bound. Let all signatures be composed independently of each other by a random independent choice of elements of each of them. The whole procedure is similar to drawing balls out of an urn. Set an M-ary PSK alphabet and treat it as an urn with different M balls (code symbols). Pick out one ball K times, each time noting the result and returning the ball to the urn. This gives the first symbols of K signatures. The next symbols of all the signatures are generated the same way. Since all M-ary symbols in this scheme are equiprobable, uniformly spaced on the plane (see Figure 2.6c) and independent of each other, we have the following expectations:

ak;i ¼ 0; ak;i al;j ¼

8 > < 1; k ¼ l and i ¼ j > :

0; otherwise

¼ kl ij

ð7:37Þ

the second equation stemming from the fact that the expectation of the product of independent entities equals the product of their expectations. Let us use this in an estimation of the average squared correlation of signatures at the integration interval of N chips:  N 1 X a a jz_kl ðmÞj ¼   i¼0 k;i l;i 2

2   m 

ð7:38Þ

Physically (7.38) is nothing but the expectation of MAI power (k 6¼ l), or of multipath interference power (k ¼ l) created by the lth signature shifted by m chips at the kth 1

Saving symbol N for the processing gain, i.e. the number of chips per data symbol, we will from now on denote a signature period by L, whenever they may be different.

230

Spread Spectrum and CDMA

correlator output. Squaring the modulus and interchanging the summation and averaging (expectation of sum equals sum of expectations) gives: jz_ kl ðmÞj2 ¼

N X1 X1 N

ak;i al;i

 m ak;j al;j m

ð7:39Þ

i¼0 j¼0

To estimate the MAI effect set k 6¼ l and split the summands into products of independent random variables: jz_kl ðmÞj2 ¼

N X1 X1 N i¼0 j¼0

ak;i ak;j  al;i

m al;j m

Now applying (7.37) to this equation leaves only terms with i ¼ j in the right-hand side

sum, resulting in jz_kl (m)j2 ¼ N. Estimating the effect of multipath interference let us put k ¼ l, m 6¼ 0, which brings (7.39) to the form: jz_kk ðmÞj2 ¼

N X1 N X1

ak;i ak;i

 m ak;j ak;j m

i¼0 j¼0

In terms here having different i and j ak, i is independent of both ak, i m (since m 6¼ 0) and ak, j (since i 6¼ j). By the same reasoning, ak, j m is independent of both ak, j and ak, i m . Therefore: ak;i ak;j

m

 ak;i

 m ak;j

¼ ak;i ak;j

m

 ak;i

 m ak;j ;

i 6¼ j

Due to the independence of different symbols of the same sequence ak, i ak, j m ¼ ak, i  ak, j m ¼ 0, whenever i 6¼ j m, and ak, i m ak, j ¼ ak, i m  ak, j ¼ 0, whenever i m 6¼ j. Hence, addends of the double sum above with different i, j may appear non-zero only if both equations are true: i ¼ j m and i m ¼ j, which is impossible for any non-zero m. Consequently, only summands with equal i and j produce non-zero contribution, and: jz_kk ðm 6¼ 0Þj2 ¼

N X1  i¼0

  ak;i 2 ak;i

m

2  ¼N

The useful effect, i.e. the power, created by the non-shifted kth signature at the kth receiver output: jz_ kk ð0Þj2 ¼

N X1  i¼0

 ak;i 2 ¼ N 2

Then the normalized unwanted effects created by either MAI or multipath interference (unwanted squared correlations): jz_kl ðmÞj2 jz_kk ð0Þj2

¼

1 jz_kk ðm 6¼ 0Þj2 1 ; ¼ 2 N N jz_kk ð0Þj

ð7:40Þ

231

Spread spectrum signature ensembles

It is clearly seen now that all unwanted squared correlations in the ensemble under consideration attain the lower bound (7.35), i.e. sets of random signatures are optimal when the number of users is around ten or more. It is extremely important to emphasize that the data modulation of random sequences meeting (7.37) (multiplying them by data symbols independent of them) does not destroy (7.37) (see Problem 7.20). Therefore, the presence or absence of modulation does not affect all of the derivations above, as well as the final result (7.40) and conclusion on the set optimality. Equations (7.37) seem to give an unequivocal instruction for designing signature ensembles. In practice, however, signatures cannot be random, since the receiver should be a priori aware of the signature modulation law in order to generate the necessary correlator reference. To realize the randomness properties (7.37) by the deterministic coding rules, so-called pseudorandom sequences are necessary. Take the deterministic PSK signature of period L and treat it as though it is one of several equiprobable realizations of a stationary ergodic random sequence fak, i g (random discrete-time process) [14,66]. The other realizations may be all cyclic shifts of the initial sequence. Then, due to the ergodicity property, each realization presents the whole random process exhaustively, and statistical averaging fak, i g over all realizations is equivalent to time averaging, i.e. evaluating the expectation ak, i and correlation moment ak, i ak, i m via constant component and periodic ACF of the deterministic signature, respectively: ak;i ¼

L 1 1X a~k;0 ; ak;i ¼ L i¼0 L

ak;i ak;i

m

¼

L 1 1X ak;i ak;i L i¼0

m

¼ kk ðmÞ

ð7:41Þ

In the same way, treating two deterministic signatures as realizations of two jointly ergodic random sequences fak, i g and fal, i g, we have equality between the correlation moments of two random sequences and CCF of two deterministic signatures: ak;i al;i

m

¼

L 1 1X ak;i al;i L i¼0

m

¼ kl ðmÞ

ð7:42Þ

The comparison of (7.41) and (7.42) with (7.37) sets a criterion of pseudorandomness: to serve as signatures in asynchronous DS CDMA all the deterministic sequences of the ensemble should ideally have zero constant component, perfect periodic ACF and zero periodic CCF: a~k;0 ¼ 0; kk ðmÞ ¼ 0; m 6¼ 0 modL; kl ðmÞ ¼ 0; k; l ¼ 1; 2; . . . ; K

ð7:43Þ

In the case of unconstrained mutual time shifts (any m in the range 0, 1, . . . , L 1 are probable) the last demands obviously contradict each other, making ensembles of this sort hypothetical for any finite L. Indeed (see also Problem 7.21), the requirements for perfect ACF and zero CCF mean nothing but zero level of correlations between all cyclic shifts of K sequences of period L, i.e. zero value of the average of unwanted squared correlations 2 . As (7.34) and (7.35) show, this is impossible with K  2, and in particular with many users 2 cannot fall smaller than 1/L.

232

Spread Spectrum and CDMA

The conclusion we just arrived at explains why so many efforts have been dedicated to searching for ensembles whose characteristics approach those of the hypothetical ensembles mentioned above when length L grows. Quite a popular criterion of this approximation is the minimax one, orienting the ensemble design towards minimizing maximum value among all unwanted correlations. Define the correlation peak max as the greater of two entities: the maximal autocorrelation sidelobe amax among all sequences and the maximal cross-correlation peak cmax among all pairs of sequences:     max ¼ maxfamax ; cmax g; amax ¼ maxp;kk ðmÞ; cmax ¼ maxp;kl ðmÞ ð7:44Þ k;l;m k6¼l

k;m m6¼0

Naturally, for the hypothetical perfect ensemble, max along with 2 is zero, and for any real ensemble max may serve as an adequate measure of its proximity to the perfect one. Since the maximal value of any variable can never be smaller than its average, 2max  2 , which spreads the Welch bounds (7.34) and (7.35) on the correlation peak: 2max 

K 1 1  KL 1 L

ð7:45Þ

where, again, the last approximation corresponds to the case K  1. With additional limitations on the PSK alphabet, the bound above may appear rather loose, especially when the number of sequences approaches L. In particular, for sufficiently large ensembles of binary f1g sequences the Sidelnikov bound holds [67,68]: 2max 

2 L ;K  L 2

ð7:46Þ

Ensembles having max attaining the limit predicted by the lower bounds are certainly optimal in the correlation peak criterion and are sometimes called minimax. Some of them are discussed in Section 7.5.

7.4 Time-offset signatures for asynchronous CDMA In many real situations mutual time shifts of asynchronous signatures may vary only within a restricted range. The finiteness of a channel delay spread on the one hand, and system geometry on the other are the most typical factors setting such limitations. To be specific, let us turn to the uplink of a cellular mobile radio. The local clock of an active MS is synchronized with the received BS signal and has a delay 1 versus the BS clock determined by the distance D from BS to MS as 1 ¼ D/c, where c is the speed of light. Since the signal transmitted by a specific MS reaches the BS receiver with the same delay, the total delay of the signal arriving at BS versus the BS clock is 2 ¼ 2 1 ¼ 2D/c. Let Dmax be the maximal distance, the signal from which has intensity perceptible by the BS receiver. Strong path attenuation (see Section 4.6) permits signals arriving from distances markedly exceeding the cell radius Dc to be ignored, which gives a rough estimation Dmax  Dc . Then the maximal value of 2 is 2Dc /c and signals from mobiles at distances from BS ranging between zero and Dc arrive at BS within the time window

233

Spread spectrum signature ensembles

[0,2Dc /c]. Besides, multipath replicas of signals are also present, so that a complete extension max of the window spanning the delays of all multipath signals increases by the channel delay spread ds : max ¼ 2Dc /c þ ds , where ds may be maximized over all possible locations of MS. Figure 7.16 helps to show the details of these deliberations. The signal of some specific MS may have an advance as well as a delay compared to some other, and all multipath replicas of any MS signal are potentially usable by a BS receiver (RAKE processing; see Section 3.7). Therefore, the entire range of possible mutual time shifts between any multipath replicas of any signatures proves to be [ max , max ], max ¼ 2Dc /c þ ds . Certainly, in circumstances like these, one should take care to observe the second and third conditions (7.43) within the range of only really likely values of m. Let us denote   the contents of max in the number of chips rounded upwards as mmax : mmax ¼ max D . Then the range of m, where (7.43) should be obeyed, is [ mmax , mmax ]. Now take a sequence fa1, i g of the period L  K(mmax þ 1) and use as K signatures its cyclic replicas offset from each other by mmax þ 1 positions: ak;i ¼ a1;i

ðk 1Þðmmax þ1Þ ; k

¼ 1; 2; . . . ; K; i ¼ . . . ; 1; 0; 1; . . . ;

as is shown in Figure 7.17. Evidently all correlations between signatures thus arranged will be expressed in terms of ACF 11 (m) of the initial sequence fa1, i g. Evaluating the CCF of the kth and lth signatures results in: kl ðmÞ ¼

L 1 1X ak;i al;i L i¼0

m

¼

L 1 1X a1;i L i¼0

 ðk 1Þðmmax þ1Þ a1;i ðl 1Þðmmax þ1Þ m

or: kl ðmÞ ¼ 11 ½ðk

lÞðmmax þ 1Þ þ mŠ

ð7:47Þ

Suppose now that the initial sequence fa1, i g has either perfect or good enough periodic ACF 11 (m). The former is possible, e.g. for ternary or polyphase sequences (see Section 6.11), while any minimax binary sequence (Sections 6.7 and 6.9) may serve as an example of the latter. The idea is that all sidelobes of 11 (m) are negligible. Then with jmj  mmax the argument in the square brackets of (7.47) turns into zero modulo L only for the case k ¼ l and m ¼ 0modL, corresponding to the mainlobe of the ACF of the kth signature. For any other combination of k,l,m, the right-hand side of (7.47) gives Multipath replicas of signal

0

τds

2Dc /c

t

τmax

Figure 7.16 Variations of time of arrival of MS signal at the BS

234

Spread Spectrum and CDMA

1st signature

a1,0 a1,1 a1,0 a1,1

2nd signature

a1,0 a1,1

3rd signature mmax + 1

mmax + 1

Figure 7.17 Signatures formed as time-shifted copies of the initial one

a sidelobe of 11 (m), whose level was assumed to be negligible. We have thus proved that properly offset copies of the initial sequence with good periodic ACF produce the ensemble where conditions of pseudorandomness (7.43) hold within the full range of possible mutual signature shifts jmj  mmax . It follows immediately that this ensemble achieves (when 11 (m) is perfect) or approaches very closely the lowest level (7.40) of average unwanted effects due to MAI and multipath propagation or, equivalently, the Welch bounds (7.36) or (7.35). We again emphasize strongly the validity of this statement in the presence of DS data modulation of signatures, since conditions (7.43) are sufficient to minimize unwanted MAI/multipath effects in this case (see the remark following (7.40)).2 Example 7.4.1. Consider the system with chip duration D ¼ 1 ms, number of users K ¼ 60, channel delay spread ds ¼ 20 ms and cell radius Dc ¼ 15 km. In this case max ¼ 2Dc /c þ ds ¼ 120 ms and mmax ¼ 120. The signature ensemble may be arranged starting with the initial sequence fa1, i g whose period L  K (mmax þ 1) ¼ 60  121 ¼ 7260. Since fa1, i g should have a good periodic ACF the relevant candidates may be the ternary perfect ACF sequence of length L ¼ 8011, a binary m-sequence (L ¼ 213 1 ¼ 8191) or a Legendre sequence (L ¼ 7283). The 60 signatures are then just 60 cyclic replicas of the fa1, i g offset from each other by 121 chips. Clearly, there is no upper limit on the length of the sequence and it may be advisable to take it longer with an appropriate increase in signature offset to secure some safety margin.

The uplinks of the 2G cdmaOne (IS-95) and 3G cdma2000 standards present very good examples of implementation of this version of asynchronous CDMA [69]. A binary m-sequence of an extremely long length L ¼ 242 1 extended by one symbol is used as the initial one and the user-specific signatures of all mobiles are just its relevant cyclic replicas. Pseudonoise properties of an m-sequence along with signature offsets exceeding possible variations of time of arrival of signal at the BS receiver guarantee a minimal

2

Without DS data modulation, perfection of periodic ACF of the initial sequence secures zero level of both MAI and multipath interference for any m  mmax in the described signature construction.

235

Spread spectrum signature ensembles

(see (7.40)) level of average power of MAI and multipath interference at the correlator output.

7.5 Examples of minimax signature ensembles The signature ensembles considered in the previous section may be regarded as adequate only in situations where mutual time shifts of users’ signals are entirely controllable by the system and may be kept within the predicted range. If this is not the case, asynchronous CDMA based on shifted replicas of the same sequence risks collisions: the signal of one user may acquire delay, making it indistinguishable from the signal of some other user. This may be the reason for employing minimax signature ensembles, i.e. those whose correlation peaks achieve or approach bounds (7.45) or (7.46). Since the correlation peak of a minimax ensemble is maximized over the whole period, its small value (achievable at the cost of long enough length L) secures the proximity of ensemble correlation properties to the perfect ones (7.43), guaranteeing pseudorandomness of signatures. A survey of all known minimax ensembles would take a lot of space, so we will confine ourselves to a brief discussion of those that either enjoy wider practical application or seem more indicative among others. Readers interested in learning more about them may consult [9,67,70].

7.5.1 Frequency-offset binary m-sequences Take a binary f1g m-sequence fa1, i g of period L ¼ 2n 1 and use it as a signature for the first user. The rest of the K 1 signatures are generated by a symbol-wise multiplication of fa1, i g with discrete harmonics of frequencies (k 1)/L, k ¼ 2, 3, . . . , K:   2ðk 1Þi ak;i ¼ a1;i exp j ; i ¼ . . . ; 1; 0; 1; . . . ; k ¼ 1; 2; . . . ; K: L

ð7:48Þ

Thus the squared modulus of the periodic CCF of the kth and lth sequences is:  L 1   X Rp;kl ðmÞ2 ¼  a a  i¼0 k;i l;i

2   X L 1   a a ¼   m   i¼0 1;i 1;i

 2 2ðk lÞi   m exp j  L

ð7:49Þ

Consider first the case m ¼ 0 modL, i.e. a1, i a1, i m ¼ja1, i j2 ¼ 1. Then, if k ¼ l (7.49) gives 2 the mainlobe of the ACF of the kth signature, i.e. Rp, kk (0) ¼ L2 . If k 6¼ l, the sum in (7.49) is the sum of all roots of unity of degree L and equals zero (see Section 6.11.2). Now let m 6¼ 0 modL. Then according to the shift-and-add property (Section 6.11) of the m-sequence, a1, i a1, i m ¼ a1, i t for some t, and the squared CCF modulus:  L 1  2 X Rp;kl ðmÞ ¼  a  i¼0 1;i

 2  L 1  2 2ðk lÞi  X 2ðk lÞi  a exp j  ¼  t exp j   i¼0 1;i  L L 

236

Spread Spectrum and CDMA

which is the (k l)th component of the DFT energy spectrum of the sequence fa1, i g. Since the energy spectrum of fa1, i g is the DFT of its periodic ACF, and the ACF equals 1 everywhere except at the zero point, where it is equal to L, we have:  L 1   X 2ðk Rp;kl ðmÞ2 ¼ Rp;11 ðmÞ exp j m¼0

lÞm L



¼Lþ1

L 1 X

m¼0

 2ðk exp j

lÞm L



The last sum differs from zero and equals L only for k ¼ l, so that collecting all the results together and passing over to normalized correlations gives: 8 1; k ¼ l; m ¼ 0 modL > > > > > > 1 > >  2 < L2 ; k ¼ l; m 6¼ 0 modL p;kl ðmÞ ¼ > > 0; k 6¼ l; m ¼ 0 modL > > > > > > : L þ 1 ; k 6¼ l; m 6¼ 0 modL L2

It is seen now that the squared correlation peak of the ensemble (7.48): 2max ¼

Lþ1 1  L2 L

i.e. practically coincides with the Welch bound (7.45). Thus, the ensemble under scrutiny is a minimax one, realizing the optimal asynchronous CDMA mode. The description of the above ensemble one may find, e.g. in [71], yet earlier and independently it was used in the global satellite-based navigation system GLONASS (see Section 11.2). One of the advantages of this signature set versus other polyphase ones is the possibility of generating signatures by a simple offset of carrier frequency. Indeed, incrementing the carrier frequency f0 by (k 1)/LD is equivalent to a linear phase progression between adjacent chips equalling 2(k 1)/L, which is exactly what is prescribed by the rule (7.48). Despite many other minimax polyphase ensembles being known, the binary f1g ones are traditionally considered more attractive from a hardware point of view, and the rest of this section is dedicated to some important examples of binary signature sets.

7.5.2 Gold sets The following properties of binary f1g m-sequences may serve to explaining the set construction found by Gold: 1. If a binary f1g m-sequence fui g of period L ¼ 2n 1 is decimated with the decimation index d, where d is co-prime to L, the resulting sequence fvi g is again a binary m-sequence of the same period. To decimate means to pick out every dth symbol of fui g and write symbols thus obtained one by one, so that vi ¼ udi . We call the sequence fvi g produced this way a decimation of fui g.

237

Spread spectrum signature ensembles

2. Let the memory n of a binary m-sequence fui g be odd and in the decimation index d ¼ 2s þ 1 s be co-prime to n. Then d is co-prime to the length L ¼ 2n 1 of fui g, the decimation fvi g is an m-sequence of the same period L, and the non-normalized periodic CCF Rp, uv (m) of fui g, fvi g takes only three values: pffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi nþ1 Rp;uv ðmÞ 2 f 2ðL þ 1Þ 1; 1g ¼ f2 2 1; 1g; m ¼ 0; 1; . . . ; L 1 ð7:50Þ 3. Let the memory n of a binary m-sequence fui g be even, but not a multiple of four, and in the decimation index d ¼ 2s þ 1 s be even and co-prime to n/2. Then d is co-prime to the length L ¼ 2n 1 of fui g, the decimation fvi g is an m-sequence of the same period L, and the non-normalized periodic CCF Rp, uv (m) of fui g, fvi g takes only three values: pffiffiffiffiffiffiffiffiffiffiffiffi nþ2 Rp;uv ðmÞ 2 f2 L þ 1 1; 1g ¼ f2 2 1; 1g; m ¼ 0; 1; . . . ; L 1 ð7:51Þ

Proof of these propositions is rather sophisticated and demands more insight into the algebra of extension finite fields. We leave it aside and refer the interested reader to the original paper by Gold [72] or other sources (e.g. [9,70]). Now take a pair of m-sequences, fui g and its decimation fvi g, satisfying the conditions of item 2 or 3 above and form the ensemble of K signatures by the rule: ak;i ¼ ui vi k ; k ¼ 1; 2; . . . ; L

aLþ1;i ¼ ui

ð7:52Þ

aLþ2;i ¼ vi

where i ¼ . . . , 1, 0, 1, . . .. Expressing this in words, we build up L signatures multiplying symbol-wise fui g with cyclic replicas of fvi g, and two more signatures are initial m-sequences themselves. In total, therefore, we may have up to K ¼ L þ 2 ¼ 2n þ 1 signatures. In practice, the f1g m-sequence is traditionally generated as a binary {0,1} sequence, i.e. over GF(2) using an LFSR generator, with a subsequent mapping of elements of GF(2) onto the real pair f1g (see Sections 6.6 and 6.7). Thus, to implement (7.52) two n-cell LFSRs may be used, generating {0,1} predecessors fu0i g and fv0i g of fui g and fvi g. Instead of multiplication of fui g with fvi k g their predecessors may be added 0 0 modulo 2 with a subsequent mapping of the result onto f1g: ui vi k ¼ ( 1)ui þvi k . Figure 7.18 illustrates the implementation of the Gold construction according to the above description. {u′i} LFSR memory n

Mapping onto {±1} Delay k clocks

+

Mapping onto {±1}

mod2 LFSR memory n {v′} i

Mapping onto {±1}

Figure 7.18 Generating Gold sequences

{aL + 1,i}

{ak,i},1 ≤ k ≤ L

{aL + 2,i}

238

Spread Spectrum and CDMA

Let us estimate the correlation peak of the Gold ensemble, beginning by calculating correlations of the first L sequences:

Rp;kl ðmÞ ¼

L 1 X

ak;i al;i

i¼0

m

¼

L 1 X

ui ui

m vi k vi l m

i¼0

It is seen that since the case m ¼ 0 modL and k ¼ l corresponds to the mainlobe of the kth ACF, the situation should be analysed where these equalities are not fulfilled simultaneously. But then either both ui ui m and vi k vi l m are just some other shifts of the initial sequences fui g, fvi g, or only one of those products is a sequence consisting of only ones. In the first case we have the CCF of the initial m-sequences fui g, fvi g taking on only the three values indicated by (7.50) or (7.51), while in the second we have the non-normalized ACF sidelobe of one of the sequences fui g, fvi g, i.e. 1. Consider now the CCF of fak, i g, k ¼ 1, 2, . . . , L and fal, i g, l ¼ L þ 1: Rp;kl ðmÞ ¼

L 1 X

ui ui

m vi k

i¼0

If m ¼ 0 modL, ui ui m ¼ 1 and the CCF is simply a constant component of fvi g, i.e. 1. Otherwise ui ui m ¼ ui s for some s and we have the CCF of initial m-sequences obeying the restrictions (7.50) or (7.51). The same is true for the CCF of fak, i g, k ¼ 1, 2, . . . , L and fal, i g, l ¼ L þ 2. Finally, the CCF of faLþ1, i g and faLþ2, i g is directly the CCF of the initial m-sequences, while their autocorrelation functions, like those of m-sequences, have non-normalized ACF sidelobes equalling 1. Collecting all of the results together, we see that the correlation peak (7.44) of the Gold set is determined by the maximal in modulus value of the original CCF (7.50) or (7.51). After normalizing it to the length L we come to the estimation:

2max ¼

8 pffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi 2 > 2ðL þ 1Þ þ 1 > > > ; n 6¼ 0 mod2; < L2  pffiffiffiffiffiffiffiffiffiffiffiffi 2 > > > > : 2 L þ 1 þ 1 ; n ¼ 2 mod4 L2

8 2 > > < L ; n 6¼ 0 mod2  > > : 4 ; n ¼ 2 mod4 L

ð7:53Þ

with the last approximation corresponding to large length L  1. As is seen, for any odd memory n Gold signature ensembles asymptotically (L  1) attain the Sidelnikov lower bound (7.46), while for the case of even n not divisible by four their loss in max against this bound is about 3 dB.3

3

When n ¼ 0 mod4 a Gold ensemble also exists with the same correlation peak as in the case n ¼ 2 mod4, but with number of sequences smaller by one [67,70].

239

Spread spectrum signature ensembles

Example 7.5.1. Construct Gold sequences of length L ¼ 23 1 ¼ 7. An ensemble of that small length is impractical but useful for elucidating the idea. Let us start with the binary f0, 1g m-sequence first met in Example 6.6.1: fui0 g ¼ f1, 0, 0, 1, 0, 1, 1g. The decimation index d ¼ 3 meets the limitation of item 2 above. Then the decimation sequence is fvi0 g ¼ f1, 1, 1, 0, 1, 0, 0g. Symbol-wise summation of fui0 g and fvi0 g modulo 2 gives the sequence f0, 1, 1, 1, 1, 1, 1g, which after mapping to alphabet f1g gives the first Gold sequence fa1, i g ¼ fþ g. Shifting fvi0 g to the right by one position and adding 0 modulo 2 to fui g gives the sequence f1, 1, 1, 0, 0, 0, 1g, which after transition to symbols f1g gives the second Gold sequence f þ þ þ g. Six more Gold sequences are obtained by further shifts of fvi0 g, adding modulo 2 to fui0 g and changing symbols into f1g. Along with fui0 g and fvi0 g transformed into f1g sequences, we obtain K ¼ 23 þ 1 ¼ 9 sequences altogether. Checking the value of the correlation peak in this simplest case makes little sense, since with L ¼ 7 no non-normalized periodic correlation, but the ACF mainlobe, may exceed 5, predicted by (7.53). Building Gold ensembles of greater lengths and checking their optimality is the subject of Problem 7.40.

Gold ensembles enjoy great popularity in modern CDMA systems. Suffice it to say that they are employed in the space-based global navigation system GPS for multiplexing satellite signals, and in the 3G mobile radio UMTS standard for scrambling CDMA codes, etc.

7.5.3 Kasami sets and their extensions The idea of constructing Kasami sets is very close to that described above for the Gold scheme. Let us decimate a binary f1g m-sequence fui g of even memory n ¼ 2h with the decimation index d ¼ 2h þ 1. Obviously, this d is not co-prime to the period L ¼ 2n 1 ¼ (2h 1)(2h þ 1) of the sequence fui g, resulting in a decimation sequence fvi g ¼ fudi g of the period being a factor of L. It may be shown that if fui g is initialized so that u0 ¼ 1 the ‘short’ sequence fvi g is actually a binary m-sequence of period L1 ¼ 2h 1, whose non-normalized periodic CCF with fui g over the long period L takes only two values [9,70,73]: Rp;uv ðmÞ ¼ 2h

pffiffiffiffiffiffiffiffiffiffiffiffi 1¼ Lþ1

1; m ¼ 0; 1; . . . ; L

1

ð7:54Þ

Then L1 Kasami signatures of length L are formed as symbol-wise products of the initial m-sequence fui g with L1 different cyclic replicas of fvi g, and one more signature is a ‘long’ sequence itself: ak;i ¼ ui vi k ; k ¼ 1; 2; . . . ; L1 aL1 þ1;i ¼ ui

ð7:55Þ

pffiffiffiffiffiffiffiffiffiffiffiffi where i ¼ . . . , 1, 0, 1, . . .. There are K ¼ L1 þ 1 ¼ 2h ¼ L þ 1 such signatures of period L in total. Of course, again, multiplication of f1g sequences fui g, fvi g may be

240

Spread Spectrum and CDMA

{u′i} LFSR memory n {vi′} LFSR memory n/2

Mapping onto {±1} Delay k clocks

+

Mapping onto {±1}

{aL1 + 1,i}

{ak,i},1 ≤ k ≤ L1

mod2

Figure 7.19 Generating Kasami sequences

realized as modulo 2 addition of their f0, 1g predecessors fu0i g, fv0i g, but, unlike the Gold set, to form the ‘short’ sequence fv0i g the necessary length of LFSR is two times smaller: h ¼ n/2 (see Figure 7.19). Proof of the minimax property of the Kasami set: 2max

pffiffiffiffiffiffiffiffiffiffiffiffi 2 Lþ1þ1 1  ;L  1 ¼ L2 L

ð7:56Þ

is performed based on (7.54), similarly to that of the Gold set, and is left to the reader as an exercise (Problem 7.28). The comparison of the two binary ensembles shows a significant gain (6 dB) of Kasami sets in the correlation p peak versus ensembles ffi ffiffiffiffiffiffiffiffiffiffiffi ffi pffiffiffiGold of the same length in exchange for much smaller ((L þ 2)/ L þ 1  L times) number of sequences K.4 pffiffiffiffiffiffiffiffiffiffiffiffi Example 7.5.2. Construct the Kasami set of length L ¼ 24 1 ¼ 15 (h ¼ 2, K ¼ L þ 1 ¼ 4). Start by building the binary f0, 1g m-sequence fui0 g of length L ¼ 15 based on the primitive polynomial f (x ) ¼ x 4 þ x þ 1 and initial loading u00 ¼ 1, u10 ¼ u20 ¼ u30 ¼ 0. We have fui0 g ¼ f1, 0, 0, 0, 1, 0, 0, 1, 1, 0, 1, 0, 1, 1, 1g. Decimation of this sequence with the index d ¼ 2h þ 1 ¼ 5 produces the m-sequence of period three fvi0 g ¼ f1, 0, 1, 1, 0, 1, 1, 0, 1, 1, 0, 1, 1, 0, 1g. Modulo 2 sums of fui0 g and three shifted replicas of fvi0 g after transferring to the alphabet f1g are the first three Kasami sequences: þ þ þg, fa2, i g¼ fþ þ þ þ þ þ þ þ þ g and fa1, i g ¼ fþ þ fa3, i g ¼ f þþ þþþþþ þ þg. The fourth one is fui0 g converted into f1g symbols: a4, i ¼ f þ þ þ þ þ þ þ g. Direct calculation shows that all their non-normalized CCF as well as the non-normalized ACF sidelobes of the first three take on only values 5 and 3, so that 2max ¼ 1/9 in full agreement with (7.56). A Matlab program for building arbitrary Kasami sets and verifying their correlation properties is the subject of Problem 7.41.

The relatively small number of Kasami sequences makes rather remarkable the method found by Kamaletdinov [74] to extend the Kasami set almost two times without

4

Bounds (7.45) and (7.46) may be slightly improved for binary sets allowing for the non-normalized correlations taking on only integer values. As a result it appears that both Gold sets of odd memory and Kasami sets are strictly (not only asymptotically!) optimal in correlation peak among all binary sets [67,70].

241

Spread spectrum signature ensembles

sacrificing the correlation peak. Let n be divisible by 4: n ¼ 4r, r integer, so that L ¼ 24r 1 ¼ 16r 1 ¼ 15, 255, 4095, .p . ..ffiffiffiffiffiffiffiffiffiffiffi Then ffi in addition to the Kasami set another binary ensemble of length L and size L þ 1 exists called the bentffi sequence ensemble pffiffiffiffiffiffiffiffiffiffiffi [9,75] and possessing the same minimax property 2max ¼ ( L þ 1 þ 1)2 /L2  1/L. In very general terms constructing bent sequences again consists of symbol-wise multiplication of two initial sequences: a ‘long’ m-sequence of period L ¼ 24r 1 and some special sequence based on the so-called bent function. The details of this are tricky enough and will not be discussed here, but the important thing is that any bent sequence has normalized CCF with any of the first L1 Kasami sequences (7.55) not exceeding by its modulus the correlation peak of both the Kasami and bent sequence ensembles. Therefore, it is possible composite ensemble including pffiffiffiffiffiffiffiffiffiffiffiffi to arrange apffiffiffiffiffiffiffiffiffiffiffi ffi L1 ¼ 2h 1 ¼ 22r 1 ¼ L þ 1 1 Kasami and L þ 1 bent sequences and possessing the former correlation peak 2max ¼ (L þ 1)/L2  1/L. The ensemble thus obtained is unique in the sense that among all known binary ensembles p with correlation peak ffiffiffiffiffiffiffiffiffiffiffi ffi 2max  1/L this one has the greatest number of signatures K ¼ 2 L þ 1 1.

7.5.4 Kamaletdinov ensembles More binary minimax ensembles exist [9,67]; however, some of them differ from the described ones only in a fine structure of sequences but not in length L, size K and correlation peak max . Against this background the ensembles discovered by Kamaletdinov [76] are of a particular interest, covering the range of lengths differing from those of Gold and Kasami sets. In order to make the idea easier to understand, we describe a somewhat narrowed version of Kamaletdinov sets, although with no loss as to the length range or parameters achievable. To outline the first Kamaletdinov scheme let us take prime odd p > 3 of the form p ¼ 4h þ 3 ¼ 3mod4 and extend the definition of the binary character (x) given in Section 6.8 to the zero element of GF(p) putting (0) ¼ 1 (an alternative (0) ¼ 1 will produce the same final result). Let us treat a position number i of the sequence symbol as an element of GF(p), i.e. being reduced modulo p, and form p þ 1 p-ary sequences dk, i over GF(p) (i.e. with elements from this field) as follows:

dk;i

8 i þ iþk þ  i ; k ¼ 1; 2; . . . ; p > > > < ¼ i þ i ; k ¼ p > > > : i þ  i; k ¼ p þ 1

1 ð7:57Þ

where all arithmetic is that of GF(p),  is a primitive element of GF(p) and i ¼ . . . , 1, 0, 1, . . .. One may see that every sequence in (7.57) is formed as a sum of sequences of co-prime periods p and p 1 (p 1 ¼ 0 ¼ 1), and therefore has the period L ¼ p(p 1). Now perform a mapping of sequences (7.57) onto the binary alphabet f1g using the extended binary character: ak;i ¼ ðdk;i Þ; k ¼ 1; 2; . . . ; p þ 1; i ¼ . . . ; 1; 0; 1; . . .

ð7:58Þ

242

Spread Spectrum and CDMA

The binary set thus generated has parameters: L ¼ pðp

1Þ; K ¼ p þ 1; 2max ¼

ðp þ 3Þ2 L2

ð7:59Þ

Length L may be made large enough only by a proper choice of p (p  1), in which case (p þ 3)2 /L ¼ (p þ 3)2 /(p2 p)  1 and 2max ! 1/L, showing after comparing with (7.45) at least asymptotical optimality of the ensemble in the correlation peak. Example 7.5.3. Let p ¼ 7. Direct verification confirms that  ¼ 3 is a primitive element in GF (7). Then the sequences fi g and f i g are both of period p 1 ¼ 6: f. . . , 1, 3, 2, 6, 4, 5, 1, 3, . . .g and f. . . , 1, 5, 4, 6, 2, 3, 1, 5, . . .g, respectively. Combined modulo 7 with the sequence fig ¼ f. . . , 0, 1, 2, 3, 4, 5, 6, 0, 1, . . .g of period 7, as prescribed by (7.57), they produce K ¼ p þ 1 ¼ 8 7-ary sequences of period L ¼ p(p 1) ¼ 42. For instance, the first of them is fd1, i g ¼ f221136110025006614665503554462443351332240g. Replacing their 7-ary elements by the extended characters according to the rule (0) ¼ (1) ¼ (2) ¼ (4) ¼ 1, and (3) ¼ (5) ¼ (6) ¼ 1 converts the sequences into 8 binary ones, e.g. fa1, i g ¼ fþ þ þ þ þþþþþ þþ þþ þ þþ þþþ þ þ þ þþg. It is rather tiresome to compute their ACF and CCF ‘by hand’, and Problem 7.42 provides Matlab software to support it.

The second Kamaletdinov construction exploits the p-ary (p ¼ 4h þ 3 ¼ 3mod4) linear sequence fcki g obtained by decimation with the index d ¼ p 1 of p 1 shifts fdiþk g, k ¼ 1, 2, . . . , K ¼ p 1 of the p-ary m-sequence fdi g having memory n ¼ 2, i.e. length p2 1. Since d divides p2 1 the sequence fcki g ¼ fddiþk g has the period (p2 1)/(p 1) ¼ p þ 1. Now let us build p 1 sequences over GF(p): dk;i ¼ i þ cki ; k ¼ 1; 2; . . . ; p

1; i ¼ . . . ; 1; 0; 1; . . . ;

ð7:60Þ

and map them onto the binary alphabet f1g according to (7.58). This generates the ensemble with parameters: L ¼ pðp þ 1Þ; K ¼ p

1; 2max ¼

ðp þ 1Þ2 1 ¼ 2 2 p L

ð7:61Þ

Again, for the case of long lengths (p  1) the ratio (p þ 1)2 /L ¼ (p þ 1)2 /(p2 þ p) ! 1 and 2max ! 1/L, demonstrating at least asymptotical optimality of the ensemble. Example 7.5.4. This time there is no exclusion for p ¼ 3 and the p-ary m-sequence fdi g of memory n ¼ 2 and length p 2 1 ¼ 8 may be formed by the primitive polynomial over GF (3) of the second degree f (x ) ¼ x 2 þ x þ 2, or equivalently, by a recurrent equation di ¼ 2di 1 þ di 2 . The initial loading d0 ¼ 1, d1 ¼ 0 produces the sequence fdi g ¼ f. . . , 1, 0, 1, 2, 2, 0, 2, 1, 1, 0, . . .g. Its shifts decimated with index d ¼ p 1 ¼ 2 transform into two sequences of period 4: f. . . , 1, 1, 2, 2, 1, 1, 2, 2, . . .g and f. . . , 0, 2, 0, 1, 0, 2, 0, 1, . . .g. After symbol-wise addition with

243

Spread spectrum signature ensembles

the sequence fig ¼ f. . . , 0, 1, 2, 0, 1, 2, . . .g they give K ¼ p 1 ¼ 2 sequences of period L ¼ p(p þ 1) ¼ 12: f1, 2, 1, 2, 2, 0, 2, 0, 0, 1, 0, 1g and f0, 0, 2, 1, 1, 1, 0, 2, 2, 2, 1, 0g. The last step, replacement of their elements by extended characters (0) ¼ (1) ¼ þ1, (2) ¼ 1, produces the Kamaletdinov set of two binary sequences of length L ¼ 12: fa1, i g ¼ fþ þ þ þ þ þ þþg and fa2, i g ¼ fþ þ þ þ þ þ þþg. Their ACF and CCF are not difficult to compute by hand (or with the aid of the program of Problem 7.43), coming to 2max ¼ 1/9 in full agreement with (7.61). Table 7.1

Examples of binary minimax signature sets

Ensemble Gold

Length L 2n

1, n 6¼ 0 mod4

Size K L þ 2 ¼ 2n þ 1

7,31,63,127,511,1023 Kasami

2n 1, n even 15,63,255,1023

Union of Kasami and 2n 1, n ¼ 0 mod4 bent sequences 15,255 Kamaletdinov 1 Kamaletdinov 2

pffiffiffiffiffiffiffiffiffiffiffiffi Lþ1

pffiffiffiffiffiffiffiffiffiffiffiffi 2 Lþ1

p(p 1), (p ¼ 3 mod4, prime) p þp1ffiffiffi¼ ffi ! L 42,110,342,506,930

p(p þ 1), (p ¼ 3 mod4, prime) p p1ffiffiffi¼ ffi 12,56,132,380,552,992 ! L

1

pffiffiffiffiffiffiffiffiffi 4Lþ1þ3 2 pffiffiffiffiffiffiffiffiffi 4Lþ1 3 2

Squared correlation peak 2max pffiffiffiffiffiffiffiffiffiffiffi ( 2(Lþ1)þ1)2 ! L2 , n odd L2 pffiffiffiffiffiffiffiffiffi 2 (2 (Lþ1)þ1) ! L4 , n even L2 pffiffiffiffiffiffiffi ( Lþ1þ1)2 ! L1 L2 pffiffiffiffiffiffiffi ( Lþ1þ1)2 L2

! L1

(pþ3)2 L2

! L1

(pþ1)2 L2

! L1

To prove the propositions on the correlation peak of the ensembles above, the theory of quadratic equations in finite fields is necessary. Leaving this sophisticated issue aside, we refer the interested reader to the original paper [76]. Let us summarize now our knowledge on the binary minimax ensembles in Table 7.1, presenting length (listing all the lengths of existing ensembles within the range 7  L  1023), number of signatures and squared correlation. The table is expressive enough as regards the significant contribution of Kamaletdinov sets: the number of their lengths in the considered range is 11, compared to 6 for Gold and 4 for Kasami sets.

Problems 7.1. In a DS CDMA system based on periodic binary signatures and BPSK data modulation, a user transmits the signal fþ þ þ þþþ þþþ þ g covering more than two data bits. What is the signature code of this user (the common sign of all symbols being immaterial) if data bit duration equals signature period? 7.2. In a DS CDMA system based on periodic binary signatures and BPSK data modulation, a user employs the signature code fþ þ þ þ g, data bit duration

244

7.3.

7.4.

7.5.

7.6.

7.7.

7.8.

7.9.

7.10. 7.11.

7.12.

7.13.

7.14.

Spread Spectrum and CDMA

being equal to the signature period 7D. Due to the failure of timing recovery in the receiver, the despreading reference lags behind the received spreading signal by one chip. What is the result of data demodulation when a stream of zero data bits is transmitted? How will the presence of amplitude modulation in an APSK signature affect the structure of a DS spreading receiver? Will the despreading in this case return a data symbol to the form characteristic of a non-spread transmission? A DS CDMA system uses QPSK for data transmission at the rate 64 kbps and spreading code with chip rate 1.28 megachips per second (Mcps). Find the spreading factor and bandwidth occupied by the system. An FH CDMA system uses a 4-frequency spreading signal of length N ¼ 4: f1, 4, 2, 3g and 4-FSK data transmission (each couple of bits is transmitted by one of 4 frequencies). The transmitted bit stream is 00101101. Draw a possible time–frequency array of the transmitted signal if one data bit covers two chip durations. What sort of FH is used: fast or slow? An FH CDMA system uses a 4-frequency spreading signal of length N ¼ 4: f1, 4, 2, 3g and 4-FSK data transmission (each couple of bits is transmitted by one of 4 frequencies). The transmitted bit stream is 10110100. Draw a possible time–frequency array of the transmitted signal if one signature chip covers two data bits. What sort of FH is used: fast or slow? A fast FH CDMA system uses 16-frequency spreading signal and 4-FSK data modulation. The chip duration is 10 ms. Estimate the minimal bandwidths of spreading and transmitted signals if chips of different frequencies should be orthogonal. A synchronous CDMA system with BPSK data transmission at the rate R ¼ 9:6 kbps should be organized within an available bandwidth Wt ¼ 76:8 kHz. How many users can it accommodate to preserve the optimality of a single-user receiver? Design an appropriate binary signature set. How will the number of users change if BPSK data transmission is replaced by QPSK, 8-PSK or 16-QAM? If any of them increases the number of users, at what cost does this happen? A synchronous CDMA system serves 36 users employing orthogonal signatures of equal energy per bit. How many new signatures (bandwidth and user data rate being fixed) of the same bit energy can one add to the existing ones without sacrificing minimum distance between different group signals? What is the minimum length of synchronous signatures allowing a no smaller than 33% increase of the number of users in the oversaturation scheme (7.23)? Add a supplementary signature to the four Walsh functions of length N ¼ 4. Is the supplementary signature binary? If not, can you modify the primary signatures to make the supplementary one binary? K ¼ (4N 1)/3 synchronous signatures are built according to the oversaturation scheme (7.23). Is it a good idea to use them for a K-user CDMA, if only a singleuser receiver is acceptable? Find the minimal length potentially allowing MAI power per signature per conventional receiver in a synchronous oversaturated CDMA no higher than 30 dB relative to the useful signal power, if the number of users is 101. Prove that three or more binary sequences of length N cannot be orthogonal to each other unless their length is a multiple of four.

245

Spread spectrum signature ensembles

7.15. Can an oversaturated Welch-bound set of K ¼ 21 binary signatures exist? What about K ¼ 22, 23 or 32? 7.16. Outline the procedure of building a Welch-bound set of K ¼ 256 binary sequences of length N ¼ 100. 7.17. (Karystinos and Pados [64].) Prove that for an oversaturated set of an odd number K of binary signatures, the Welch bound (7.30) rises to: TSC 

K2 N 1 þ N N

7.18. Build an ensemble of K ¼ 15 binary signatures of length N ¼ 12 achieving the bound of the previous problem. Generalize the procedure to K ¼ 2m 1 signatures (K > N). 7.19. What is the minimum period of K ¼ 11 asynchronous signatures which does not prohibit obtaining average squared correlation between all their cyclic replicas within 20 dB? 7.20. Consider random signatures meeting (7.37). Prove that multiplication of signatures by data symbols (data modulation) does not disturb (7.37), provided data symbols are independent of signature symbols. 7.21. Prove that if two sequences of the same least period L both have perfect periodic ACF, their periodic CCF cannot equal zero for all mutual shifts. 7.22. Find the maximal number of asynchronous signatures of the period L ¼ 100 which does not prohibit retaining the correlation peak below 23 dB. 7.23. K ¼ 50 users may move freely within a zone of radius Dc ¼ 15 km. The maximal delay spread of the channel between a user and central station ds ¼ 20 ms. Bandwidth allocated to the system is 2 MHz. Find the minimum lengths of the binary m-sequence and Legendre sequence allowing arranging time-offset signatures for the link ‘user–central station’. Find the minimal length of the perfect PACF ternary sequence of memory 3 matching this problem. 7.24. In Section 7.5.1 an m-sequence is used to generate a frequency-offset signature set. Does any other binary minimax sequence (e.g. a Legendre one) allow the same way of obtaining a signature set with squared correlation peak around 1/L? If not, why? 7.25. A CDMA system operates at carrier wavelength 4 cm with signature chip duration 1 ms. The length of signatures should be L ¼ 210 1 ¼ 1023. What maximal number of frequency-offset signatures may be arranged, if the user’s velocity ranges up to 144 km/h? 7.26. Find all decimation indexes fitting the Gold algorithm for lengths 63, 127, 511, 1023. 7.27. A signature ensemble is necessary to serve K ¼ 100 users with correlation peak no greater than 0.064. What is the minimal length of the Gold ensemble meeting these demands? 7.28. Prove the minimax property (7.56) of Kasami sets. 7.29. A signature ensemble is necessary of size no smaller than 31 with correlation peak below 23 dB. Find the ensemble of minimal length among the known binary ones matching this requirement.

246

Spread Spectrum and CDMA

7.30. A signature ensemble is necessary of size no smaller than 24 with correlation peak below 25 dB. Find the ensemble of minimal length among the known binary ones matching this requirement.

Matlab-based problems 7.31. Write a program illustrating the principle of DS spreading–despreading (see Figures 7.3 and 7.4). 7.32. Figure 7.20 illustrates Matlab simulation of fast FH spreading using the example of 6 chips per one bit duration, the 4-frequency signature fFi g ¼ (1, 3, 2, 1, 0, 3) and binary FSK data modulation (frequency offset of bit one fd ¼ 4). Write a program simulating fast FH spreading–despreading for a range of parameters.

B(t)

1.0 0.5 0.0 0

0.5

1.0

1.5

2.0

2.5

3.0

0

0.5

1.0

1.5

2.0

2.5

3.0

0

0.5

1.0

1.5

2.0

2.5

3.0

0

0.5

1.0

1.5

2.0

2.5

3.0

Fs(t)

3 2 1

fd*B(t) + Fs(t)

0 6 4 2 0

St(t)

1 0 –1 t/Tb

Figure 7.20 Fast FH spreading

7.33. Write a program calculating the squared distance between two group signals (7.11) using equation (7.15) for an arbitrary given synchronous signature set and binary data transmission. Test it for an orthogonal signature set (e.g. Hadamard matrix rows), varying randomly the patterns of differences "k . 7.34. Modify the program of the previous problem to calculate the minimum squared distance in a constellation of group signals (7.11) for an arbitrary set of K synchronous signatures and binary data transmission. Up to which set sizes K does the program run in a reasonable time? 7.35. Write a program generating an oversaturated signature set according to the scheme (7.23) for lengths N ¼ 4l with arbitrary l. Take the lth Kronecker degree of H4 from Example 7.2.1 as the primary signatures. Make sure that all the

Spread spectrum signature ensembles

247

supplementary signatures are binary. Use the program of Problem 7.33 for a spot check of the distances between group signals. 7.36. Write a program simulating multiuser reception in oversaturated synchronous CDMA. Steps to be done: (a) (b) (c) (d) (e) (f) (g) (h)

Form K ¼ 21 binary signatures as in the previous problem. Form a random K-dimensional vector of bits transmitted by K users. Modulate the signatures by bits in the BPSK manner and form a group signal. Add the Gaussian noise to the group signal, setting the noise standard deviation to something like the signature amplitude. Plot the observation obtained. Try all possible 2K bit patterns, each time forming a candidate group signal and measuring the Euclidean distance from it to the received observation. Give out the decision on the bit pattern providing the closest candidate group signal to the observation and check whether all bit decisions are correct. Run the program, increasing the noise level, and comment on the results.

7.37. Write a program computing total squared correlation and average squared correlation per signature pair for an arbitrary synchronous signature set. 7.38. Write a program constructing an oversaturated binary Welch-bound set of K ¼ 2n signatures of arbitrary length N < K. Use the set obtained in simulating K-user synchronous CDMA. Steps to be done: (a) Construct a Hadamard matrix of size K. (b) Discard N K rows in it and use the columns of the truncated matrix as signatures. (c) Form the K-dimensional vector of users’ data, and use it to manipulate signatures and form a group signal. (d) Simulate K single-user receivers, each calculating the correlation of the received group signal with an appropriate signature and taking the decision according to the polarity of the correlation. (e) Compare the K-dimensional vector of decisions on the data with the one really transmitted and find the number of erroneous bits. (f) Repeat items (c)–(e) 1000–10 000 times and find the bit error probability per user. (g) Run the program for n ¼ 5, 6, 7, 8 finding each time the minimal length N (maximal oversaturation K/N) where errors do not still occur. 7.39. Write a program simulating an asynchronous CDMA employing time-offset replicas of the same binary m-sequence. Recommended steps: (a) Set the maximal number of users K ¼ 20 25 and the maximal delay in number of chips mmax ¼ 80 100. (b) Form the binary f1g m-sequence of length L  K(mmax þ 1). (c) Take as K signatures K cyclic replicas of the m-sequences, each delayed from the previous by mmax þ 1. (d) Pick out Ka first signatures (active users) and manipulate all but the first by random independent bits, bit duration fixed within N ¼ 160 200 chips.

248

Spread Spectrum and CDMA

(e) Shift all manipulated signatures but the first randomly and independently versus their initial versions within the range [0, mmax ] and add their sum to the first signature to come to a group signal. (f) Imitate a single-user receiver for the first user, calculating the correlation within one bit of the first signature and the group signal. (g) Demodulate the first user bit and compare it to the true one (which is zero). (h) Varying the number of active users, e.g. Ka ¼ 5, 10, 20, . . . repeat items (d)–(g) 1000–5000 times for every Ka . Calculate an experimental floor SIR at the correlator output and the bit error probability and compare them with the predictions q2I ¼ N/(K 1), Pe ¼ Q(qI ). (i) Plot 5–7 overlapped example realizations of a group signal and cumulative sum at the receiver integrator output (Figure 7.21 presents example plots for K ¼ 25, Ka ¼ 20, N ¼ 169, mmax ¼ 80).

Group signal

10 0 –10 0

20

40

60

80

100

120

140

160

0

20

40

60

80 t/∆

100

120

140

160

Correlation

300 200 100 0

Figure 7.21 Group signal and receiver integrator output in asynchronous CDMA

7.40. Write a program generating the Gold set and outputting the histogram of the values of the periodic ACF and CCF of its members. Figure 7.22 presents example plots for N ¼ 25 1. (a) Generate a binary m-sequence of a proper memory n  5. (b) Decimate it in an appropriate manner to come to the second initial m-sequence. (c) Form 15–20 Gold sequences as prescribed by (7.52), including initial m-sequences.

249

30 20 10 0 –10 30 20 10 0 –10

Occurences

Rc(τ)

Ra(τ)

30 20 10 0

Rc(τ)

Ra(τ)

Spread spectrum signature ensembles

0

5

10

15

20

25

τ

30

0

5

10

15

20

25

τ

30

0

5

10

15

20

25

τ

30

0

5

10

15

20

25

τ

30

30 20 10 0 –10 5000

0

–10

–8

–6

–4

–2

0 2 Correlation

4

6

8

10

Figure 7.22 Periodic correlations and histogram of correlations for the Gold set of length 31

(d) Calculate their periodic ACF and CCF. (e) Plot ACF of one of the initial m-sequences, ACF of some other Gold sequence, CCF of two initial m-sequences, and CCF of another pair out of the Gold sequences obtained. (f) Plot a histogram of all unwanted correlations (CCF values and ACF sidelobes). (g) Output the correlation peak and compare it with the theoretically predicted one and the lower bound. (h) Run the program for relevant odd and even values n and interpret the results. 7.41. Write a program to investigate Kasami sets. The procedure may be in general similar to that of the previous problem, but now it makes sense to calculate the correlations between all (not only selected) sequences. 7.42. Write a program to investigate Kamaletdinov sets determined by (7.57)–(7.58). Figure 7.23 present the plots for the case p ¼ 11. Recommended steps:

(a) Set p ¼ 3 mod4, find a primitive element  in GF(p) and its inverse  1 . (b) Form K ¼ p þ 1 sequences over GF(p) as defined by (7.57), all arithmetic being of GF(p). (c) Map the sequences obtained onto the binary f1g alphabet according to (7.58).

250

Spread Spectrum and CDMA

Ra(τ)

100 50 0 0

10

20

30

40

50

60

70

80

90

100

110

0

10

20

30

40

50

60

70

80

90

100

110

0

10

20

30

40

50

60

70

80

90

100

110

0

10

20

30

40

50

60

70

80

90

100

110

Ra(τ)

100 50 0

Rc(τ)

100 50 0

Rc(τ)

100 50

Occurences

0 10000 5000 0

–15

–10

–5

0 Correlation

5

10

15

Figure 7.23 Periodic correlations and histogram of correlations for Kamaletdinov set of length 110

(d) Calculate the periodic ACF and CCF of all the sequences of the previous item. (e) Plot ACF of sequences faK, i g and fa1, i g. (f) Plot CCF of this pair and pair faK 1, i g, faK, i g. (g) Plot a histogram of all unwanted correlations (CCF values and ACF sidelobes). (h) Output the correlation peak and compare it with the theoretically predicted one and the lower bound. (i) Run the program, varying p, and interpret the results. 7.43. Write a program to investigate Kamaletdinov sets determined by (7.60). Run it varying p, plot selected periodic ACF, CCF, and histograms of unwanted correlations. Register the correlation peak, and compare it to the theoretically predicted one and to the lower bound.

8 DS spread spectrum signal acquisition and tracking

8.1 Acquisition and tracking procedures One of the most characteristic problems in spread spectrum technology is measuring the time of arrival and frequency of the received signal. In the systems where spread spectrum signals are used for ranging and measurement of object motion parameters (radar, sonar, navigation), time–frequency estimation is the main task. In spread spectrum communications it is the core of the timing recovery procedure. In fact, to correctly demodulate the transmitted data a receiver of any digital communication system should know with sufficient accuracy the borders of symbols, frames etc. in the received datastream. In other words, the local receiver clock should be properly synchronized with the received datastream. In spread spectrum systems a particularly precise synchronism is demanded, since time-mismatch between the received spreading signal and its local despreading replica (the reference) exceeding or equal to chip duration, will completely destroy the despreading and subsequent data demodulation (see Section 7.1). Therefore, the synchronization-related tasks of a receiver include preliminary (to starting the data recovery session) alignment of its own despreading reference with the spreading code of the arriving signal and maintaining rather accurate synchronism between them over the whole subsequent data reception time. Certainly, from the theoretical point of view, the synchronization procedure is not anything new: to align a local reference with the received signal one has just to measure the time–frequency shift of the received signal against the local clock. Then, if necessary, the receiver oscillator may be time–frequency corrected and thereby synchronized with the received signal. The optimal (ML) strategies of measuring time delay and frequency were thoroughly discussed in Sections 2.12–2.14. In practice, however, their ‘pure’ realization very often runs into serious obstacles. The initial (e.g. when the receiver is primarily activated) bias

Spread Spectrum and CDMA: Principles and Applications Ó 2005 John Wiley & Sons, Ltd

Valery P. Ipatov

252

Spread Spectrum and CDMA

of the local clock in time and frequency against the received signal may appear rather large. Among the factors causing such a mismatch are autonomous operation of the transmitter and receiver clocks, the wide range of variations of path length between the transmitter and receiver, Doppler frequency shift due to their relative motion etc. In such circumstances direct implementation of the ML rule sometimes proves to be excessively demanding or even prohibitive in terms of resource consumption, as is demonstrated by the example below. Example 8.1.1. The ranging C/A signal of the GPS (see Section 11.2) has period containing L ¼ 1023 chips or in real time LD ¼ 1 ms. To solve the navigation task, one should measure the time position of the signal with accuracy no worse than a split microsecond, for instance 0.1 of chip duration D. If the receiver is initialized with no prior knowledge of a local clock mismatch versus the signal, the uncertainty of the signal delay spans one period, i.e. LD. Turning to the correlator-bank receiver of Figure 2.18, one can see that its realization means implementing 10 230 parallel correlators. Switching to the matched filter structure (Figure 2.19) does not make the problem easier: such a filter with memory LD, digitally realized, would have to operate with at least 10 samples per chip, performing 1023 summations during one sampling interval (smaller than 100 ns). Involving such an enormous hardware or software resource for performing only one of many tasks of the receiver does not look commercially justified, at least considering current technological tendencies.

In order to avoid implementation difficulties, the practical procedures of time– frequency estimation in a wide uncertainty region are often performed in the form of two successive steps. The first, called acquisition (code acquisition, search), performs a coarse measuring of the necessary parameters and provides preliminary estimates used by the second step, called tracking. This second step, typically performed by special code tracking and frequency tracking loops, delivers fine time–frequency estimations used further immediately by a local reference generator to align the despreading signal with a received spreading code. But in order to capture synchronism (pull-in) and enter the tracking state, the tracking loops need an initial targetting, e.g. knowledge of a received signal timing within one chip duration or so. This, as was already pointed out, is the task of the acquisition stage, reducing the primary uncertainty of signal parameters to that demanded by a tracking loop. Comparatively soft requirements towards the accuracy of estimates at the acquisition step allow cutting down the amount of calculated statistics and simplifying the implementation. To come back to Example 8.1.1, slackening the demands on the necessary precision of time measurement to one chip duration means a ten times smaller number of correlators in the scheme of Figure 2.18 or ten times lower processing speed in the matched filter structure. Yet the main resource-saving technique exploited by acquisition is a partial or complete replacement of parallel computations of the decision statistics by a serial one. To explain this let us treat unknown delay and frequency shift F of the signal as signal coordinates on the time–frequency plane. Suppose that the initial uncertainty ranges of and F are u and Fu , respectively, and that as a result of acquisition those ranges should be reduced to  and F. Then, as Figure 8.1 shows, signal position is within one of M   F rectangular cells, where M ¼ (Fu u )/(F ). The acquisition

253

Signal acquisition and tracking

Fu F

δF

τ

Figure 8.1

δτ

τu

Search zone and signal position on the delay–frequency plane

should find out which one of M cells contains the signal, i.e. test M competitive hypotheses (see Section 2.8). If the optimal testing procedure were used, M correlations (2.74) would be computed in parallel for values and F corresponding to cell centres, and then the decision made in favour of , F corresponding to the highest correlation. Typical acquisition procedures, however, utilize the long presence of signal at the receiver input, which permits calculation of only several (not all M) correlations at a time. If none of them is large enough, the decision is taken that there is no true cell (i.e. containing the signal) among those tested and the search continues by examining another group of cells. The procedure goes on this way until some correlation is recognized as large enough to suggest that the corresponding cell is true. This terminates the acquisition, after which a tracking loop starts working, targetted by the estimations obtained. Remarkable research has been done concerning acquisition algorithms and strategies (see, for example, the bibliography in [77]). Below we will limit ourselves to only very brief discussion, starting with the simplest version of acquisition.

8.2 Serial search 8.2.1 Algorithm model In a serial search only one cell at a time is tested, i.e. only a single correlation is calculated of the observation and a local signal replica, having some specific time– frequency shift. The correlation magnitude is then analysed in order to decide whether the cell is true or false. Various criteria may serve to take the decision. For example, the search may continue until all the cells inside the uncertainty region (see Figure 8.1) are tested, all the time storing in memory the maximal correlation observed up to now along with the values of , F corresponding to it. Then, after the last cell is analysed, the cell believed to be true is known automatically by its coordinates kept in memory, and all to be done is just reading them out. This strategy is equivalent to implementing the ML estimation rule, but calculating the necessary correlations not simultaneously but sequentially in time for successively arriving signal segments. Still more typical of practical receivers is another version of a serial search, where the currently found correlation magnitude is just compared with a threshold [6,9,77]. If the

254

Spread Spectrum and CDMA

Phase found y(t)

Correlator

s(t – τ)

Figure 8.2

Control logic

Code generator

Threshold

Serial search of a spreading code phase

correlation is larger than the threshold the decision is made that the current cell is true and the search finishes. Otherwise the search system examines the next cell and so forth. From the point of view of performance analysis it does not matter how many parameters are unknown and to be estimated in the course of searching: both time and frequency (or whatever else) or some one of them. The only material thing is the overall number of cells to be checked. Yet to make further deliberations more transparent we will treat them as though an acquisition consists in only measuring the time delay of a received signal, the frequency being known a priori with sufficient precision. Figure 8.2 presents the structure running a serial search in this case. When a spreading code is periodic, the maximal uncertainty time zone may span only one period and all greater delays are reduced to fall within one period. In this light the name ‘phase’ is also appropriate as a synonym of delay of a periodic code [2,6,9] and transferring from one cell to the next in the uncertainty region means just changing the phase of the local code replica. When a current correlation is below the threshold the search control logic orders the local generator to increment the phase of the code replica s(t ) at its output by one chip or a split chip, and the procedure goes over to examining the next cell. If the current correlation exceeds the threshold the control logic signals that acquisition is finished and the code generator keeps the code phase corresponding to the cell declared to be true. In the following sections we discuss the performance of this algorithm based on the analysis of [78] and referring the reader inclined to learn more to [6,9,77,79–81].

8.2.2 Probability of correct acquisition and average number of steps To simplify the analysis (still with no compromise of the basic regularities), let us assume that the local code replica is shifted versus the received signal by an integer number of chip durations. Then with L being the code period there are L possible code phases altogether, only one of which is true. To put it differently, there may be at most L search cells and every transition from one cell to the next means incrementing the code phase by one chip duration. Very often checking all of these L cells in the course of a search is needless thanks to reliable prior information shortening the search region to only M of L cells. Let us begin with an assumption that the search starts with the least favourable empty cell inside the uncertainty region, i.e. most distant from the true one. Figure 8.3 illustrates this premise: the first reaching of the true cell (black circle) takes place only after passing safely over M 1 empty cells (white circles).

255

Signal acquisition and tracking

1

2

3

1 – pf

1 – pf

pf

pf

M

M–1

pf

1

1 – pf

1 – pd

pf

pd

M–1

pf

M

1

1 – pf

1 – pd

pf

pd

pf

End

Figure 8.3

A serial search of a code within the uncertainty region of M cells

In order to achieve a reliable distinction between correlation levels in the false and true cells the search system should calculate the correlation in every cell over a sufficient time interval: dwell time. Whatever dwell time and threshold are set up, decisions on whether a cell is true or false cannot be absolutely faultless. One sort of possible error is a false alarm (see Section 3.2), i.e. declaring an empty cell true. When that happens, the search procedure finishes in the false cell, and it is natural to try to keep the probability of such an event low enough. On the other hand, dwelling in a true cell may also end up with non-zero probability by the wrong decision: missing the signal and transition to the next (empty) cell, which had been already examined earlier. This makes the search procedure cyclic: if it is not finished after the first scanning of the uncertainty region, a second one is performed and so on, each of the successive restarts initiating a new search cycle. Below we accept that the sought signal is present at the receiver input permanently so that the number of possible cycles has no upper limit. It is seen from Figure 8.3 that if the search system comes safely to a true cell there are two possible routes from it: correct decision (and finishing search) with detection probability pd or missing signal with probability 1 pd . The latter event entails only continuing the search by the next cycle of testing and has no negative consequences except for the extra time spent before the acquisition. Dwelling in an empty cell also has two possible outcomes: correctly declaring it false, accompanied by transferring to the next one with probability 1 pf , or recognizing it true with false alarm probability pf . In comparison to signal missing, this second error is more catastrophic, since the wrong code phase delivered by the search means that all the operations performed by the receiver afterwards are useless. To secure low risk of this event every decision that the code phase is found is typically rechecked at the cost of additional dwelling (see the next section) in the suspicious cell, but nevertheless some non-zero probability remains of terminating the search in the wrong cell. Let us call a search step every dwelling in some cell ending with the decision to either prolong or stop the search. It is seen directly from Figure 8.3 that when the search starts at cell number one (most remote from the true one) it may stop at the tth false cell (t ¼ 1, 2, . . . , M 1) after mM þ t steps, and in the true cell after mM þ M ¼ (m þ 1)M steps, where m ¼ 0, 1, . . . is the number of complete ‘idle’ search cycles, i.e. passages across the uncertainty region preceding the final (m þ 1th) cycle, at which the search stops in either a false or true cell. Then reading Figure 8.3 as a flow chart produces the following equation for probability p(s) of finishing the search after s steps: 8 h im > < pf ð1 pf Þt 1 ð1 pd Þð1 pf ÞM 1 ; s ¼ mM þ t; t ¼ 1; 2; . . . ; M 1 ð8:1Þ pðsÞ ¼ h im > : pd ð1 pf ÞM 1 ð1 pd Þð1 pf ÞM 1 ; s ¼ mM þ M

256

Spread Spectrum and CDMA

where m ¼ 0, 1, . . . . The events (and only those ones) whose probabilities are expressed by the second row of (8.1) all imply finishing the search with a correct estimation of code phase. Therefore, the overall probability Pc1 (the index ‘1’ indicates that the search starts from the first cell) of correct search outcome (correct acquisition) is just the sum of all these probabilities over the whole range of m, i.e. the sum of the geometric progression with the ratio (1 pd )(1 pf )M 1 : Pc1 ¼ pd ð1

pf Þ M

1

1 h X m¼0

ð1

1

pf Þ M

pd Þð1

im

¼

1

pd ð1

ð1

pf Þ M

pd Þð1

1

pf ÞM

1

ð8:2Þ

Another important parameter is the average number of steps s1 of the search: s1 ¼

1 X s¼1

spðsÞ ¼ mM þ t

ð8:3Þ

where again index ‘1’ points at the starting cell number one. In equation (8.3) m stands for the average number of idle search cycles running before the final one, while t denotes the average number of steps within the last cycle finishing in either a false or true cell. The probability of an individual cycle being idle is a product of the probabilities of nonstopping in all M 1 empty cells and a unique true cell, i.e. (1 pd )(1 pf )M 1 . Consequently, the probability p(m) of exactly m idle cycles elapsing before the search stops is: h ih im pðmÞ ¼ 1 ð1 pd Þð1 pf ÞM 1 ð1 pd Þð1 pf ÞM 1 ; m ¼ 0; 1; . . . ð8:4Þ As is seen, probability distribution p(m) obeys the geometric law, whose expectation is well known, yet bearing in mind further needs we show how it is found through the generating function [14,66]: gm ðzÞ ¼ zm ¼

1 X

zm pðmÞ

m¼0

The derivatives of the generating function at the point z ¼ 1 allow calculating moments of an associated random variable. In particular:  1 X dgm ðzÞ ¼ mpðmÞ ¼ m  dz z¼1 m¼0

For a generic geometric distribution p(l ) ¼ al (1 a), l ¼ 0, 1, . . . ; 0 < a < 1, the generating function is obtained by summation of a geometric progression: gl ðzÞ ¼

1 X l¼0

zl al ð1

aÞ ¼

1 a 1 za

so that after differentiation: l¼

að1 ð1

 aÞ   zaÞ2 

z¼1

¼

a 1

a

ð8:5Þ

257

Signal acquisition and tracking

Comparing a generic geometric law with distribution (8.4) shows readily that substitution a ¼ (1 pd )(1 pf )M 1 in (8.5) produces the desired expectation m: m¼

1

ð1

ð1

pf Þ M

pd Þð1

1

pf Þ M

pd Þð1

ð8:6Þ

1

To find the second term t in (8.3) note that the probability of terminating a final cycle in an empty cell number t regardless of how many idle cycles preceded may be found by summation in m of all probabilities of the first row in (8.1) (see also Figure 8.3), while the probability of safely reaching the unique (Mth) true cell and stopping in it (again, regardless of the number of preceding idle cycles) is just (8.2). Thus, the probability distribution p(t) of the number of steps t within the final cycle is:

pðtÞ ¼

8 > > > > pf ð1 > >
> > > > > : Pc1 ¼

pf Þ t

1

1

1 h X m¼0

pd ð1

ð1

ð1

pf Þ M

pd Þð1

p f ÞM

pd Þð1

1

im

¼

1

pf Þ t

pf ð1

1

ð1 pd Þð1 pf ÞM t¼ 1; 2; . . . ; M 1

1

;

1

pf Þ M

1

;t ¼ M

The generating function of this probability distribution is: gt ðzÞ ¼ ¼

M X t¼1

zt pðtÞ ¼

pf 1

ð1

pd Þð1

pf 1

ð1

pd Þð1

pf Þ M

 1

z

pf Þ

M 1

M X1 t¼1

pf Þ t

zt ð1

1

þ zM Pc1

1

zM ð1 pf ÞM 1 zð1 pf Þ

þ zM Pc1

Differentiating gt (z) at the point z ¼ 1 gives, after some elementary algebra: t¼

1

ð1

pf Þ M

pf ½1

ð1

Mpf ð1

pd Þð1

pd Þð1

pf Þ M

1

pf Þ M 1 Š

ð8:7Þ

Then using (8.6) and (8.7) in (8.3) ends in the average number of steps: s1 ¼

1 pf ½1

ð1

ð1

pf Þ M

pd Þð1

pf ÞM 1 Š

ð8:8Þ

Let us now abandon our initial assumption about a starting cell and consider how beginning the search in a cell number r affects the results above. In this case the partial cycle (attribute it as number zero) arises spanning M r empty cells plus one true cell. The following events are possible within this cycle: finishing the search at a false tth cell with probability p0 (tjr) ¼ pf (1 pf )t r , t ¼ r, r þ 1, . . . , M 1, finishing it in the true cell with probability p0 (t ¼ Mjr) ¼ pd (1 pf )M r , and, lastly, missing the signal and

258

Spread Spectrum and CDMA

continuing the search from the first cell with probability P0m (r) ¼ (1 pd )(1 pf )M r . Then the overall probability of the correct acquisition when starting from the rth cell is: Pcr ¼ p0 ðt ¼ MjrÞ þ P0m ðrÞPc1 ¼

pd ð1

ð1

1

pf Þ M

pd Þð1

r

pf Þ M

ð8:9Þ

1

The average number of steps is recalculated in the same way. When the search terminates at the tth cell of zero cycle the number of steps passed is t r þ 1, but if the signal is missed, s1 extra steps on average will be added to the M r þ 1 passed already. Thus, the average number of steps sr , when starting from an arbitrary (rth) cell, is: sr ¼

M X t¼r

ðt

r þ 1Þp0 ðtjrÞ þ ðM

r þ 1 þ s1 ÞP0m ðrÞ

The first sum here, after changing the summation index to i ¼ t pf

M Xr

ið1

i¼1

pf Þ i

1

þ ðM

ð8:10Þ

r þ 1, becomes:

r þ 1Þp0 ðt ¼ MjrÞ

ð8:11Þ

where the first term is easily evaluated through the generating function, as was done in the derivation of (8.7): M Xr i¼1

ið1

pf Þ i

1

¼

1

ð1

pf Þ M

rþ1

ðM p2f

r þ 1Þpf ð1

pf Þ M

r

Using this in (8.11) and (8.10) along with equality p0 (t ¼ Mjr) þ P0m (r) ¼ (1 after a plain algebraic treatment gives: sr ¼

1

ð1

pf Þ M pf

rþ1

þ s1 P0m ðrÞ ¼

1

Pcr Pcr þ pf pd

pf ) M

r

ð8:12Þ

Certainly, under substitution r ¼ 1 (8.9) and (8.12) turn into (8.2) and (8.8), respectively. Now, knowing the prior probability distribution p0 (r) of an initial cell number r we may average (8.9) and (8.12) over all initial cells within the search region. For a uniform a priori distribution p0 (r) ¼ 1/M, r ¼ 1, 2, . . . , M this operation results in the following overall average probability Pc of a correct acquisition and average number of steps s of the search: Pc ¼

M pd ½1 ð1 pf ÞM Š 1 X Pcr ¼ M r¼1 Mpf ½1 ð1 pd Þð1 pf ÞM 1 Š



1

Pc pf

þ

Pc pd

ð8:13Þ ð8:14Þ

8.2.3 Minimizing average acquisition time Calculation and comparing with a threshold of correlation for every candidate code phase means dwelling for some finite time at every analysed cell. In general this time

Signal acquisition and tracking

259

may be random, and, moreover, will depend on whether a current cell is true or false. We, however, limit ourselves to considering here only the simplest version of a serial search assuming fixed dwell time Td . Some other options will be briefly discussed in the next section. Then the average time T s spent by the search system is just a product of the average number of steps and dwell time: T s ¼ sTd . It is evident that, signal power fixed, the longer is the dwell time Td the more reliable may be the decision on whether the cell is true or false, i.e. smaller values of the false alarm (pf ) and signal miss (1 pd ) probabilities per cell may be secured. Certainly, the reliability of the search characterized by the probability of a correct acquisition Pc should not be worse than some predetermined quantity. As (8.13) shows, the same value of Pc may be achieved via different combinations of the probabilities pf , pd per cell. This fact underlies the opportunity of minimizing average search time by varying one of the parameters pf or pd , while the probability Pc of the correct acquisition is maintained constant. The physical nature of such optimization is pretty clear. Suppose we impose on the detection probability a strict requirement of being very close to one. This means that the search will almost certainly succeed in only one (initial) cycle; however, to secure high detection probability the dwell time at every cell has to be long, so that the search drifts slowly toward the true cell and average acquisition time T s is large. On the other hand, we may accept a high probability of signal miss in order to shorten Td , but this will lead to a high probability of repeated cycles, increasing the average number of steps as compared to the previous case, owing to which average acquisition time Ts may again appear large. Obviously, some intermediate optimum should exist for the detection probability per cell pd minimizing the value T s . To solve the task T s ¼ min , Pc ¼ const, one needs to specify explicitly the dependence of dwell time on probabilities pf , pd , i.e. equivalently, the channel model. Assuming AWGN channel, we recall that the correlation modulus is physically just a real envelope at the matched filter output, which is a Gaussian noise envelope for an empty cell and an envelope of signal plus noise mixture if the cell is true. It is well known and may be found in any communications handbook (e.g. [2,4,7,8]) that the PDF of the Gaussian noise envelope obeys the Rayleigh law (see Section 3.2 or (3.12)), while the envelope of the sum of signal and Gaussian noise has Rician PDF. In the normalized form convenient here, the latter may be written as: 8   Y 2 þ q2d > < Y exp I0 ðqd YÞ; Y  0 2 WðYÞ ¼ > : 0; Y < 0

ð8:15Þ

where Y is the value of the envelope normalized to the noise standard deviation, qd is voltage SNR accumulated during the dwell time Td and I0 (  ) is the modified zero-order Bessel function of the first kind. Of course, substitution qd ¼ 0, meaning absence of signal, turns (8.15) into the Rayleigh PDF (note that I0 (0) ¼ 1). Remember that the decision on the contents of the cell is done by a comparison of Y with a threshold. If the threshold normalized to the noise standard deviation is Yt then

260

Spread Spectrum and CDMA

the decision that the cell is true is taken whenever Y  Yt . Then we may write for the probabilities pf , pd : pf ¼

Z1

WðY jH0 ÞdY; pd ¼

Z1

WðY jH1 ÞdY

Yt

Yt

where PDFs W(Y jH0 ) and W(Y jH1 ) are versions of (8.15) for the hypotheses H0 (empty cell, qd ¼ 0) and H1 (true cell, qd > 0), respectively. The integrals above are:   Yt2 pf ¼ exp ð8:16Þ ; pd ¼ QM ðqd ; Yt Þ 2 where QM (  ,  ) is just the designation of the integral of Rician PDF, also called the Marcum Q-function [7,8]. Solving the first equation (8.16) for the unknown Yt , pf being set up, gives the threshold necessary pffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi ffi for retaining the false alarm probability at the predetermined level: Yt ¼ 2 ln (1/pf ). Substituting it into the second equation (8.16) associates pd and pf directly, given accumulated SNR qd : sffiffiffiffiffiffiffiffiffiffiffiffiffi! 1 ð8:17Þ pd ¼ QM qd ; 2 ln pf In its turn,p SNR provided by dwelling during time Td is defined as usually (see Section ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi ffi 3.2): qd ¼ 2PTd /N0 , with P being the signal power and N0 being the one-side noise power spectrum density. Now, let Td (pf , pd ) and qd (pf , pd ) be the dwell time and SNR necessary to secure fixed probabilities pf , pd . Then: Td ðpf ; pd Þ ¼

q2d ðpf ; pd Þ 2P=N0

ð8:18Þ

Eventually, the average search time according to (8.14):   1 Pc Pc þ sTd ¼ Ts ¼  Td ðpf ; pd Þ pf pd or in normalized form: Ts

    2P 1 Pc Pc 2 þ q ðpf ; pd Þ ¼ N0 pf pd d

ð8:19Þ

Now the optimization solution becomes straightforward. Let the probability of correct acquisition Pc and size of the search region M be specified. 1. Set some value of false alarm probability per cell pf within the range 0 < pf < 2(1 Pc )/M. 2. Solving (8.13) as an equation for unknown pd find its value securing the required Pc along with given pf :

261

Signal acquisition and tracking

30

34 Pc = 0.99

Pc = 0.999 32

28

26

30 M = 104

24

Ts  2P M  N0

 

22

 

Ts  2P M  N0

M = 104 28

26 103

103

20

24 200

200

18

22 50

16 0.75

0.80

0.85

50 20 0.75

0.90 0.95

0.80

pd

Figure 8.4

0.85

0.90 0.95 pd

Normalized average acquisition time against the detection probability per cell

pd ¼

1

MPc pf ½1

ð1

pf Þ

M 1

ð1

pf Þ M 1 Š

½1 þ pf ðMPc

1ފ

3. Solving (8.17) as an equation for unknown qd find its value securing the pair pf , pd . 4. Substitute this solution into (8.19). 5. Varying pf build the dependence of average search time on pd and pick the pair pd , pf delivering minimum to the T s . Figure 8.4 presents the curves of the normalized acquisition time T s (2P=N0 )M 1 against the detection probability per cell pd for two probabilities of successful acquisition Pc ¼ 0:99, 0:999 and four widths of an uncertainty region M ¼ 50, 200, 103 and 104 . As it shows, the minimum of average time occurs in the segment pd 2 [0:9, 0:95]. Allowing for rather flat behaviour of curves in the vicinity of the minimum value, pd ¼ 0:9 may be accepted as a universal figure for optimal detection probability per cell independently of the uncertainty range M and the probability of a correct acquisition Pc .

8.3 Acquisition acceleration techniques 8.3.1 Problem statement Naturally, average acquisition time grows with the number of cells M to be tested, i.e. uncertainty region extension, all other factors kept the same. The tendency is then

262

Spread Spectrum and CDMA

understandable to reduce M whenever possible, by providing the search system with relevant prior information on the code phase, signal frequency or other scanned parameters. For instance in the GPS each of 24 satellites transmits data about the current and predicted state of the whole space constellation, which are stored in a user’s receiver. Thank to this, after the user captures the signal of any satellite, he—knowing his approximate location—may pre-compute with some accuracy the code phases of the other visible satellites, substantially narrowing the uncertainty region of their search. A somewhat similar scenario takes place in the mobile telephone cdmaOne (IS-95), where strict synchronism of all the base stations facilitates searching for the signal of a new BS by the user’s receiver in the course of handover. Still, scenarios are inescapable where the uncertainty region is so wide that it can make the acquisition time of a plain serial search described above intolerably long. Among other things, this may be characteristic of initializing a receiver (first switching it on), when its own clock standard has an arbitrary shift with respect to a system one, and a priori data cannot be used to narrow the search region. Let us illustrate such a case by way of example. Example 8.3.1. Consider the searching phase of the code of length L ¼ 215 (‘short’ code of cdmaOne) with no prior information narrowing an uncertainty region. Putting M ¼ L ¼ 215 and the probability of a correct outcome no smaller than 0.99 one may extrapolate from Figure 8.4: T s  25  215 /(2P/N0 ). If we accept as appropriate the figure 2P/N0 ¼ 40 dB Hz, the average acquisition time will exceed 80 s. The estimation obtained is, however, rather optimistic, being based on the assumption of perfect initial chip synchronism (see beginning of Section 8.2.2). In such an idealized situation, it would be adequate to increment the code phase from step to step by a full chip duration. In practice, such a chip-synchronism often is not available and one-chip incrementing is at risk of hitting the signal ACF at the slope of the mainlobe instead of the peak point (see, e.g., Figure 6.9), which increases the hazard of missing a true cell. To avoid this trouble one should use a smaller increment, typically half of a chip, increasing the number of cells M within the uncertainty region and, automatically, the acquisition time.

The issue of time-consumption may become all the more crucial in applications employing very long spread spectrum codes, like systems of ranging and tracking remote space objects. Let us briefly and without resorting to mathematical subtleties describe the main techniques of accelerating the search operation.

8.3.2 Sequential cell examining The strategy of constant dwelling time independently of whether the cell is false or true, which was accepted above, might be refined bearing in mind that the majority of cells are empty. Indeed, the potential technique allowing quick recognition of an empty cell at the cost of prolonged examination of the true one should intuitively save acquisition time. Such methods do exist and are covered by the general name of sequential analysis. The simplest sequential procedure is a two-dwell one [9,78,82]. Its key idea consists in dividing the examination process into two stages. In the first of them a rather low

Signal acquisition and tracking

263

threshold secures a low probability of signal miss even with dwelling time Td1 short enough. At the same time, the false alarm probability appears to be much higher than would be tolerable within the previous (single dwell) method. Due to the short dwelling time Td1 false cells are on average examined quickly, but a high percentage of them (up to 10% or even more) are declared as true. In order to sift out false cells mistaken by the first stage for true, the second stage, having much better reliability than the first, is performed. The latter is achieved by a proper parameter choice: longer dwelling time Td2 and higher threshold provide total (including the first stage, too) error probabilities per cell satisfactory to meet the required probability of a correct acquisition (8.13). If the stages are performed independently, i.e. correlation at the second is computed ignoring that accumulated at the first, total false alarm and detection probabilities per cell are pf ¼ pf 1 pf 2 and pd ¼ pd1 pd2 , the second index numerating the stage. The total dwell time per cell now proves to be random since examining any cell either finishes at the first stage or with some probability passes on to the second stage. The false alarm probability of the first stage pf 1 , being many times higher than the total one pf , is still much smaller than the detection probability pd1 . This implies that the average dwell time for a false cell T df ¼ Td1 þ pf 1 Td2 is smaller than a similar value at the true cell T dt ¼ Td1 þ pd1 Td2 , which is favourable for saving acquisition time. With an optimal choice of pd1 , pd2 the average acquisition time may be reduced two times or more compared to the search with fixed dwell time [9,78]. Further enhancement is possible with a greater number of stages, where each one rechecks the decisions of the previous [9,78,83–86]. The extreme case of this multiple dwell strategy is the Wald sequential analysis [85], where decision attempts are committed continuously with processing each successive chip. Two thresholds are then used and a cell is declared empty as soon as an accumulated correlation drops below the lower one, while the decision that a cell is true is taken if the upper threshold is crossed. As long as the decision statistic (correlation) remains between the thresholds dwelling in the cell continues by integration of more and more chips [77,78]. Calculation of acquisition time of multiple dwell (or in general sequential) strategies of a serial search may seem more complicated as compared to the case of a fixed-time one, because of the randomness of dwell time per cell. An effective way of simplifying the problem is given in [78], where it is proved that the average acquisition time for the search starting from the least favourable cell may be found as the product of the average number of cycles and average duration of one cycle.

8.3.3 Serial-parallel search An evident resource of search acceleration involves several parallel correlators, each operating autonomously and scanning a separate part of the uncertainty region. In this case an initial uncertainty region just breaks into nc sub-regions each covering M/nc cells, where nc is the number of parallel channels, and acquisition time accordingly reduces nc times. In the uttermost case when nc ¼ M the search becomes fully parallel and does not require serial steps. This opportunity enjoys wide application in real equipment and is especially efficient when exploiting hardware components which are necessarily present in the receiver but would otherwise be idle during the search session.

264

Spread Spectrum and CDMA

For example, any modern GPS receiver contains a multitude of correlator channels necessary for parallel tracking of signals of all (or, at least, four) visible satellites. During the search period these channels are free of other tasks and may be used for signal acquisition.

8.3.4 Rapid acquisition sequences Scenarios are possible where speeding up an acquisition becomes of paramount importance. Imagine, for example, a system of object positioning in remote space. In order to enable unambiguous measurement of a distance in a very wide range, estimated to be maybe hundreds of thousands of kilometres or more, a spread spectrum signal of a suitably large period (e.g. hundreds of thousands or millions of chips) is necessary. Needless to say, the traditional search strategies discussed above will appear prohibitively slow unless the number of correlators goes up to many hundreds. For such cases special code sequences optimized according to the minimum acquisition time criterion may appear an effective option. Why is a serial search so slow when applied to signals with good (having low sidelobes) ACF? The answer is straightforward: examining and rejecting any current empty cell reduces the uncertainty region by only one cell, and no fewer than M trials are necessary to pass across the whole zone starting at the least favourable cell. Then another question arises: is it not possible to arrange a sequence which would allow halving an initial uncertainty zone after testing one correlation, instead of discarding only one cell? Stiffler found an exhaustive solution of this problem [86], although some effective codes saving acquisition time had been proposed earlier [87]. Stiffler’s rapid acquisition sequences have a plain structure, being just the sum of strictly synchronized n components. The first is a sequence of chips of alternating polarities (   þ þ þ þ   ), i.e. has period L1 ¼ 2 chips. The second is a meander wave (   þ þ þþ   ) with period L2 ¼ 4 chips, etc. up to the nth meander of period Ln ¼ 2n chips. We may treat the kth component as though it is a sequence of polarityalternating ‘long’ chips of duration 2k 1 D, where D is chip duration of the first meander. A single correlator search starts by defining a phase of the first component. Under the assumption of chip synchronism existing, there are only two possible values of it, and correlating the observed waveform with the local reference, which is a replica of the first meander, removes this uncertainty: the correlation is positive if the local replica is in-phase with the arriving first meander and negative if they are antipodal. After this step is finished the chip synchronism with the second arriving meander (the chips are now of duration 2D!) is secured and only two phases of the second meander are again possible. This uncertainty is resolved in the same way, by correlating with the local replica of the second meander, and so on until at the nth step the phase of the ‘slowest’ (nth) meander is determined by correlating with its local replica. Thus, the whole search procedure takes only n steps, each reducing two times an initial uncertainty zone M ¼ 2n . The procedure of sectioning the uncertainty zone into two equal halves is called dichotomy. Stiffler’s rapid acquisition sequence is best matched to this procedure. A straightforward generalization of the idea to the case of nc -correlator search equipment consists in replacement of meanders by n components of period

Signal acquisition and tracking

265

L1 ¼ nc þ 1 chips, where the chip of each component is L1 times longer than the preceding. The complete period of the summary sequence is L ¼ Ln1 initial chips. Each component should have as good a periodic ACF as possible and among binary components minimax ones (see Sections 6.7 and 6.9) are best. At the first step an uncertainty in L1 possible phases of the ‘fastest’ component is resolved after a parallel correlating of the received signal with nc local references, being the differences of L1 1 cyclic replicas of the first component with the L1 th one. If among nc correlations some are non-negative, the reference providing maximal correlation determines the phase, which is declared as synchronized with the first component of the received signal. Otherwise the L1 th cyclic replica is believed to be true. After this the chip bounds of the second component are known and the next step is fulfilled, repeating the same operations as the previous with the second component, etc. The procedure terminates after the nth step, where uncertainty on the phase of the slowest component is resolved in the same way as before. As is seen, each step in this case realizes testing of L1 ¼ nc þ 1 hypotheses and reduces L1 times the initial uncertainty region M ¼ L ¼ Ln1 . Again, the sequences just described are best fit to this L1 -alternative testing: for every receiver complexity (number of parallel correlators nc ) the unique code exists minimizing acquisition time. Due to this, such codes deserve to be called matched [70]. Stiffler’s rapid acquisition sequence is one of them, corresponding to a single correlator receiver. A numerical evaluation shows that the gain in acquisition time accompanying the use of these codes may range far beyond hundreds of times [70, 86] (see also Problem 8.14). An ordinary sum of binary components is a multilevel rather than a binary sequence, which entails signal amplitude modulation and is often considered objectionable. Clipping the sum and retaining only its sign transforms a matched code into binary, preserving the search procedure unchanged. The only penalty for this is a slight (within 1.5–2 times) reduction in the acquisition time gain. Note that the two-stage synchronization code of UMTS (see Section 11.4.11) is an example of a similar approach: at the first stage the primary code is found whose period is 15 times smaller than that of the secondary one. Then the second search stage removes the uncertainty on which of M ¼ 15 phases of the secondary code is true.

8.4 Code tracking 8.4.1 Delay estimation by tracking Closed tracking loops are used universally in wireless receivers to instrument continuous and accurate parameter measuring. Depending on the nature of a measured parameter, examples are automatic frequency control, phase-lock loop, automatic gain control, and others. A strict mathematical investigation proving the optimality of tracking loops for the case of time-varying signal parameters is based on the theory of nonlinear estimation [88], but their primary idea follows directly from the ML rule studied in Chapter 2. The specific character of a spread spectrum receiver manifests itself chiefly in a despreading operation (see Section 7.1), appealing to a precise synchronism of a local despreading reference with the arriving signal. Keeping this in mind, we concentrate here on the precise measurement of delay (or code phase) of the arriving signal.

266

Spread Spectrum and CDMA

To get the point most quickly let us simplify the problem up to estimating the delay of a baseband signal, removing the effects of random phase. Suppose that is an unknown delay of a baseband signal s(t). Then on the strength of the ML rule (2.55) the optimal estimator should form estimation ^ of this parameter as its value maximizing the correlation z( ) between the reference signal replica s(t ) and observation y(t). One way to implement this is a correlator bank (as in Figure 2.18) directly computing the function z( ) at M sample points; the other is a matched filter structure reproducing z( ) in real time (Figure 2.19, the envelope detector being unnecessary for a baseband signal). But both schemes may appear infeasible for the case of a spread spectrum signal of a long length: the first due to the necessity for numerous correlators and the second due to a problematic matched filter implementation (see Example 8.1.1). The tracking loop structure is one more alternative. Note that at the maximum point of z( ) its derivative vanishes: ZT

 dzð Þ z ð^ Þ ¼ ¼ d  ¼^ 0

yðtÞs0 ðt

^Þdt ¼0

ð8:20Þ

0

Let us call e(^ ) ¼ z0 (^ ) the error signal, the reasons for which will be clear soon. As is seen, one may search for ^ as an argument making the error signal zero. Assume that the genuine signal delay is and a tentative estimate is ^, and calculate the mean of the error signal over all noise realizations in y(t): eð^ Þ ¼

z0 ð^ Þ

¼

ZT

0

yðtÞs ðt

^Þdt ¼

0

ZT

0

Þs ðt

sðt

^Þdt ¼

0

ZT

s0 ðt

Þsðt

^Þdt

0

ð8:21Þ The last equality here follows after integration by parts, whenever care is taken that the integration interval spans the whole signal ‘body’ regardless of : s( ) ¼ s(T ) ¼ 0. Under the same condition the average error signal at ^ ¼ (tentative estimate coincides with a true parameter value) is zero: eð^ ¼ Þ ¼

ZT

sðt

Þs0 ðt

Þdt ¼

0

½s0 ðt

T ފ2   ¼0  2 0

but the derivative of e(^ ) at the same point according to the last part of (8.21):  deð^ Þ  d^ 



¼

z00 ð Þ

¼

ZT

½s0 ðt

ފ2 dt

0

is minus energy of the signal derivative, i.e. negative. This means that if ^ lies in a sufficiently ) is positive, while with ^ > e(^ ) is negative. This suggests small vicinity to the left of , e(^ the structure of a delay-lock loop (DLL) solving equation (8.20) by way of iterations and shown in Figure 8.5. The local reference generator creates a time-shifted replica of the signal

267

Signal acquisition and tracking

y(t)

e(τ)

Loop filter

Correlator

VCO

s′(t – τ) Reference generator

Figure 8.5 General DLL structure

derivative s0 (t ^), which is correlated in the correlator with the observation y(t). The resulting error signal is then cleared off the noise by a loop filter to approximate averaging in (8.21). When the smoothed error signal is positive it tells with a high probability that the local reference s0 (t ^) is ahead of the signal, and forces the voltage controlled oscillator (VCO) to lower its frequency, i.e. increase the reference (tentative) delay ^. On the other hand, a negative smoothed error signal drives VCO1 to the higher frequency, i.e. reduces reference delay. Clearly, in the steady state DLL maintains the error signal around zero, securing synchronism between the local reference and the arriving signal. Obviously, to operate adequately the DLL needs an initial targeting, i.e. a starting value of ^, which is close enough to a genuine signal delay. On the one hand, this imposes demands on the precision of the acquisition procedure. On the other hand, the reference waveform following from the ML rule is usually not feasible (e.g. it may include delta functions when the signal consists of rectangular chips). Typically some other waveform replaces it, which, being more convenient to implement, preserves the main property: a distinct odd dependence of error signal at the correlator output on estimation error ^ . In constructing such a reference the desire to provide pull-in (capturing synchronism) with softer requirements for the initial targeting may play an influential role. We will have more comments on this in Section 8.4.3.

8.4.2 Early–late DLL discriminators The first element of the DLL structure is a discriminator, i.e. correlator–reference combination forming an error signal e(^ ). In one of the classical schemes of DLL discriminator for a baseband signal s(t), the reference sr (t) is the difference of two time-offset replicas of the signal: the late s(t /2) and early s(t þ /2) ones,  being their time separation. Then a useful component of the error signal due to mismatch " ¼ ^ of reference versus the received signal is: eð^ Þ ¼ A

ZT

sðt

Þsr ðt

^Þdt ¼ A

0

¼ AE½ð" þ =2Þ 1

ZT 0

ð"

=2ފ

sðt

 Þ s t

^

 2





s t

 ^ þ 2



dt ð8:22Þ

In a real implementation input quantity controlling the oscillator frequency may be not a voltage, e.g. in a digitally realized loop input number plays this role. However, to avoid unnecessary multiplicity of terms we use the traditional term VCO as universal.

268

Spread Spectrum and CDMA

where E is the energy of a standard signal s(t) over integration time T, A is the amplitude of the received signal scaling it versus s(t), and ( ) is the normalized signal ACF calculated over the time space [0, T]. Take, for instance, a discrete periodic signal (spread spectrum code) of length N with chips of duration D, and let integration time span integer number l of periods: T ¼ lND, then ( ) is periodic ACF. If s(t) is a minimax binary sequence (e.g. m-sequence, Legendre sequence) with rectangular chips, then its normalized periodic ACF ( ) looks as is shown in Figure 8.6a. The advancing and retarding (with minus) copies of ( ) entering (8.22) are shown in Figure 8.6b by the dashed lines for an example separation  ¼ 2D and their difference e(") ¼ e(^ ¼ þ "), called the discriminator curve, is given in the same plot by the solid line. It is readily seen that the discriminator under consideration is fully adequate: advancing or lagging of the reference versus an input signal causes positive or negative error signal, respectively, enabling the VCO to change its frequency and move the reference in the proper direction. Figure 8.7 presents one possible structure of an early–late discriminator for the case of a baseband code. The code generator clocked by VCO forms the early signal replica s(t þ /2), which delayed by  gives a late replica. Their difference enters the correlator as a reference signal. The code replica s(t) synchronized with the input signal and used for despreading may be obtained as delayed by the /2 early replica. If the code generator is a shift-register-based one and  ¼ 2D no external delays are necessary, since all three code replicas may be read from three successive register flip-flops. An alternative scheme of the same discriminator involves two correlators first separately correlating the observation with early and late signal replicas and subtracting the results to come to an error signal e(^ ) [18,77].

ρ(τ) 1

(a) τ

0 1 e(ε)

(b) ∆ –∆

–1

Figure 8.6

Discriminator curve of the early–late DLL

ε

269

Signal acquisition and tracking

y(t)

e(τ) ˆ

Correlator

To loop filter

sr(t − τ) +

+

– s(t − τ + δ/2)

s(t − τ – δ/2) δ/2

δ/2

Code generator

From VCO

s(t − τ) To despreader

Figure 8.7

Early–late discriminator for a baseband signal

In the case of a bandpass signal the discriminator just considered may be applicable only if the receiver phase recovery loop is previously synchronized with the incoming signal carrier, so that a bandpass signal may be transformed into its real baseband equivalent. For this reason it is often called coherent, as is the DLL employing it. If preliminary phase synchronization is not possible, a noncoherent discriminator is used based on comparison of squared moduli of two correlations. These are calculated between the observed complex envelope Y_ (t) and the complex envelopes of two references, being early and late replicas of the signal code. Above all, this discriminator proves to be efficient despite the presence of data modulation. Technically it is often implemented as shown in Figure 8.8, where multiplication of complex envelopes is performed through heterodyning (see the comment at the end of Section 7.1.2). Let us inspect how this structure works, ignoring input noise and setting, with no generality violation, ¼ 0. Let the references be time-offset replicas of the spreading signal having complex envelope S_ (t) and carrier frequency f1 , which differs from the received one f0 :         _ sr t "  ¼ Re S t "  expð j2f1 t þ j#Þ ; 2 2 where an initial phase # will finally play no role. The incoming signal complex envelope AB_ (t)S_ (t) exp (j) includes along with the spreading code also signal amplitude A, data

×

Bandpass filter

Square-law detector + To loop filter

y(t)

+



× sr(t – τ^ + δ/2)

Figure 8.8

Bandpass filter

Square-law detector

sr(t – τ^ + δ/2)

Early–late noncoherent discriminator

270

Spread Spectrum and CDMA

modulation component B_ (t) and unknown initial phase . After multiplying the input signal with the references and extracting the low-frequency component the two resulting bandpass signals of difference carrier frequency f0 f1 will have complex envelopes  AB_ (t)S_ (t)S_ (t "  /2) exp [j( #)]. Suppose that bandpass filters after the multipliers have pulse response with complex envelope H_ (t). Then real envelopes at the filter outputs calculated in terms of the convolution integral (see Section 2.12.1) are:     Z1    A  _   _ _ _ BðÞS ðÞS  "  H ðt Þ d 2 2   1

If the filter pulse response is rectangular of duration T equal to data symbol duration, and data modulation is PSK, then samples of output real envelopes at the moment t ¼ T are:     T    Z     ZT     A   A            _ _ _ _ _  2 BðtÞS ðtÞS t "  2 dt ¼  2 SðtÞS t "  2 dt ¼ AE _ ð"  2Þ     0

0

being proportional to the modulus of the corresponding value of ACF _ ( ) of the spreading complex envelope. The difference of squared moduli again gives a discriminator curve of form similar to the one of Figure 8.6 (see Problems 8.7 and 8.15). Implementation of the scheme of Figure 8.8 may run into trouble in the form of parameter imbalance of the early and late branches. In order to get round it various solutions are known [9,18,77], including the tau-dither loop (another name is ‘timeshared’), where only a single branch is involved, switching by turns between the early and late references.

8.4.3 DLL noise performance DLL is just a particular case of a phase-lock loop and exposes the difficulties as to the analysis of its behaviour, which are generic to nonlinear feedback systems [89,90]. Still, one of the most important characteristics of DLL performance–noise error of a steadystate delay tracking–is easily calculated whenever the linear approximation is applicable. In practice, rather small noise error is usually wanted, meaning good filtering capability of the loop against noise. The fluctuations at the loop output may be considered small if the error, i.e. the difference between the true current signal delay and its estimation ^ delivered by DLL, is held within the linear zone of the discriminator curve with probability close to one. If this condition is met, one can believe that the discriminator curve is linear in the infinite range of error " ¼ ^ . This allows linearizing the system model as follows. Let us limit ourselves to a baseband (or equivalently, coherent) discriminator of DLL and calculate the noise power spectrum N~d (f ) at its output. Since the correlator of this discriminator correlates observation with a reference signal sr (t) ¼ s(t /2) s(t þ /2), output noise variance according to (2.15) is found as 2 ¼ N0 Er /2, where Er is reference energy over integration time T. With E being, as

271

Signal acquisition and tracking

earlier, standard signal energy, Er ¼ 2E[1 ()] and 2 ¼ N0 E[1 ()]. Integration over interval T may be thought of as low-pass filtering with bandwidth Wf ¼ 1/T, meaning that the found noise power is spread over this bandwidth and therefore one-side noise power spectrum at the discriminator output is: 2 N~d ðf Þ ¼ ¼ N0 ET½1 Wf

ð8:23Þ

ðފ

With a rectangular chip shape and negligible level of sidelobes ( ) is an isosceles triangle of unit height and base 2D, so that N~d (f ) ¼ N0 ET, whenever   D. Replacing the true discriminator curve by an imaginary linear one means just an infinite continuation of a linear segment surrounding zero point with the same slope Sd . The last may be found from (8.22) allowing for evenness of ACF:  deð"Þ Sd ¼  d" 

"¼0

    ¼ AE 0 2

0



 2



Leaning again upon a triangular shape of ACF gives: Sd ¼

(

2AE=D ¼ AE=D ¼

2AEW; AEW;

 < 2D  ¼ 2D

ð8:24Þ

where estimation of discrete signal bandwidth W ¼ 1/D is substituted. Imagine now that instead of a true noise n(t), which is added to the received signal, a dummy noise n (t) with power spectrum density N~ (f ) ¼ N~d (f )/Sd2 is added directly to a measured parameter . At the output of a linear discriminator replacing the real one, this fictitious noise will be indistinguishable from the true noise at the real discriminator output, since its power spectrum Sd2 N~ (f ) ¼ N~d (f ) is absolutely the same. We then arrive at the system model of Figure 8.9, whose input is not a signal corrupted by noise, but instead parameter itself in a mixture with a fictitious additive noise n (t). This mixture is processed by a linear closed loop, where estimation ^ is subtracted from the input quantity, outputting the error ". The filter with transfer function h~(f ) then smoothes error " scaled by a discriminator slope Sd to produce the output estimation ^. Filtering here aggregates operations fulfilled by a loop filter and VCO to convert a real discriminator error signal e(t) into a corresponding shift of a reference signal. This model is Sd τ + nτ(t)

+

+

ε

×

Filter ~ h( f )

– τ

Figure 8.9

Linearized model of DLL

272

Spread Spectrum and CDMA

entirely linear, and variance varf^ g of random fluctuations at its output may be found, based on the superposition principle, independently of signal component, as: varf^ g ¼

Z1 0

 2 N~ ðf Þh~l ðf Þ df

ð8:25Þ

where h~l (f ) is the transfer function of a closed loop. To find the last quantity it is enough to apply the delta function to the loop input. Then the output spectrum, being exactly h~l (f ), obeys the equation h~l (f ) ¼ [1 h~l (f )]Sd h~(f ) leading to a rule, which is well known in the theory of linear feedback systems [2,7]: h~l ðf Þ ¼

Sd h~ðf Þ 1 þ Sd h~ðf Þ

ð8:26Þ

A dummy spectrum of delay fluctuations N (f ) is spread over the bandwidth Wf ¼ 1/T, which is typically much wider as compared to the bandwidth of the closed loop; otherwise the latter could not smooth noise fluctuations effectively. This allows the following version of (8.25): N~d ðf ÞBN varf^ g ¼ N~ ðf ÞBN ¼ Sd2

ð8:27Þ

where the loop noise bandwidth BN is determined as: BN ¼

Z1 0

  h~l ðf Þ2 df ¼

2 Z1    Sd h~ðf Þ   df  1 þ Sd h~ðf Þ 0

Returning now to (8.23) and (8.24) and noting that () ¼ 1 write (8.27) in the form:

where

8 ð=DÞ=ð4W 2 q2l Þ; > > < varf^ g ¼ 1=ð4W 2 q2l Þ; > > : 1=ðW 2 q2l Þ; q2l ¼

/D, 0 <  < D we may

0 C no signalling mode can secure an arbitrarily reliable data transmission. On the other hand, when R < C one can always find a code guaranteeing as small a probability of mistaking one message for another at the receiving end as desired (see Figure 1.1). Shannon’s capacity theorem, being a pure mathematical existence assertion, does not point to any concrete coding algorithm to achieve the quality tipped by it. Moreover, its proof, based on averaging the error probability over all possible channel codes, shows that almost all codes of

Spread Spectrum and CDMA: Principles and Applications Ó 2005 John Wiley & Sons, Ltd

Valery P. Ipatov

278

Spread Spectrum and CDMA

sufficient length are good from this angle. And yet finding specific code rules allowing Shannon’s limit to be approached remained impenetrable up to the moment of discovering turbo codes in 1993, although lots of important and widely utilized results had been obtained in pursuing this target. Of course, modern coding theory is too sophisticated to permit pressing even its initial basics into a brief chapter. It looks all the more inappropriate against the background of the key role of coding theory in general information technology, of which spread spectrum communications is only a particular branch. Still, the importance of channel coding in spread spectrum systems is extremely high, since the majority of them are designed to operate in a very noisy environment and, what is more, many themselves create strong intra-system interference (MAI in asynchronous CDMA). The MAI effects, unlike the natural (thermal) noise, cannot be overcome just by brute force, i.e. increasing signal power, since all users have equal rights and gain in SIR for one of them obtained in this way turns into a loss for the others (see Sections 4.5 and 4.6). This leaves the designer with only two resources for withstanding MAI: increasing the spreading factor and involving powerful channel codes. Trying to handle the available space reasonably, we limit this chapter to only coding issues related to the commercial 2G and 3G spread spectrum standards cdmaOne, UMTS and cdma2000. Accordingly, the mathematical tools, designations and description manner below are narrowly adapted to match this particular task in the most economical and fast way. We refer readers interested in a more universal scope to the books on coding theory (e.g. [31,33,91]). Let us start with some basic classification of channel codes. The first feature to distinguish between them is alphabet size, according to which we talk about binary, ternary etc. codes. Although the range of applications of non-binary (e.g. Reed–Solomon or Ungerboeck) codes is pretty wide nowadays, we concentrate on only binary ones, which are used in the specifications mentioned above. Another form of classification is the way in which information data are mapped onto the codewords or code vectors (i.e. sequences of code symbols carrying the transmitted message). The point is that any channel coding consists of inserting some redundancy into the message, making the transmitted signals more distant from each other, and thereby reducing the risk of confusion between them. Depending on the way of adding this redundancy, all channel codes are classified into block or tree (trellis) codes. A characteristic of block codes is segmentation of the source bitstream, which is divided into blocks of k information bits, every block being encoded into n > k binary symbols. In so doing, the redundant n k symbols serve to protect only the k source bits of their own codeword. Codewords of tree (e.g. convolutional) codes have a different structure: a continuous-source bitstream is encoded into an infinite stream of code symbols (codestream) with no fragmentation (see details in Section 9.3). When it arrives at the receiving end the encoded word should be mapped back onto the transmitted data bits. This operation is called decoding. Physically, due to modulation, any codeword travels via the channel as some signal. When transmitted over the AWGN (or another state-continuous) channel, the signal gets corrupted by noise whose instantaneous samples are continuous. The optimal (ML) decision strategy of a receiver in the case of Gaussian noise is equivalent to the minimum Euclidean distance rule (see Section 2.1), which means declaring true the signal closest to the observation obtained. This straightforward procedure ends directly in decoded data bits and bears the name (along with its numerous approximations) soft decoding. The complexity of

279

Channel coding in spread spectrum systems

soft algorithms is the reason why an alternative hard decoding is often used instead. This decoding mode includes two steps: at the first of them decisions are made on all individual code symbols and as a result an observation appears to be demodulated into the vector consisting of symbols belonging to the code alphabet (in the considered case, binary). Some of the symbols of the binary observation thus obtained may be erroneous and then the whole demodulated vector is likely to differ from all codewords. The second step finds among all allowed codewords the one having maximal likelihood, meaning the greatest probability to be transformed by the channel to the current demodulated binary observation. Such a decoding procedure, typically ending in declaring some specific code vector as true, is called error correction. Alternatively, the goal of decoding may be limited to only checking whether the current binary observation is a true codeword or whether some errors occurred due to the channel corrupting effects. Then, if a binary observation enters the set of allowed codewords, it is mapped back onto the corresponding data bit sequence. Otherwise the fact of unsuccessful transmission is registered and the receiver either requests the transmitter to repeat the message (as in ARQ systems) or tries to restore it by interpolating the previous and subsequent ones. This sort of decoding, called error detection, is characteristic of the application of block codes in modern commercial wireless spread spectrum systems, and the following section focuses on coding formats complying with the error detection task.

9.2 Error-detecting block codes 9.2.1 Binary block codes and detection capability Suppose that b0 , b1 , . . . , bk 1 are k source bits to be encoded in a binary codeword u ¼ u0 , u1 , . . . , un 1 of length n > k. All 2k combinations of k source bits are assumed possible, meaning that there are M ¼ 2k codewords altogether. In every codeword n k binary symbols are redundant in the sense that only k symbols are necessary for oneto-one mapping of M source messages onto binary vectors. These redundant symbols make codewords more discernible from each other, securing better noise resistance. The set of all M ¼ 2k words of length n is called (n,k) block code. The hard decoding, i.e. demodulation of continuous observation into a binary one, corresponds to the model of the binary symmetrical channel (BSC), transforming an input symbol u ¼ 0, 1 into the opposite output binary one y 6¼ u with the crossover (or symbol error) probability p. The attribute ‘symmetric’ emphasizes the equal probabilities of transitions of ‘0’ into ‘1’ and vice versa (see Figure 9.1).

u 0

1–p

y 0

p p 1

1–p

1

Figure 9.1 Binary symmetric channel model

280

Spread Spectrum and CDMA

Suppose that y ¼ (y0 , y1 , . . . , yn 1 ) is the binary observation at the BSC output. If y does not coincide with one of M code vectors u, the receiver sees that erroneous symbols are present (error detection), otherwise k data bits are released corresponding to the estimated codeword ^ u ¼ y. Clearly, if a transmitted word is u0 but the binary observation coincides with another codeword, i.e. ^ u ¼ y 6¼ u0 , an undetected error occurs and the released bits are not the true transmitted ones. Let us introduce some more definitions. The Hamming distance dH (f, g) between two vectors f ¼ (f0 , f1 , . . . , fn 1 ) and g ¼ (g0 , g1 , . . . , gn 1 ) of the same length n is the number of positions where the vectors have different elements fi ¼ 6 gi . The Hamming weight wH (f) of a vector f is the number of its non-zero components. If, for example, f ¼ (01011), g ¼ (11000), then dH (f, g) ¼ 3, wH (f) ¼ 3 and wH (g) ¼ 2. It is straightforward to make sure that dH (f, g) ¼ wH (f g) and wH (f) ¼ dH (f, 0), with 0 being zero vector. Let us assume as transmitted a codeword u. The BSC will transform it into the different fixed codeword v (causing thereby an undetected error and releasing untrue data bits corresponding to v), if symbol errors occur in all dH (u, v) positions where u and v differ with no corruption of n dH (u, v) symbols coinciding in u and v. For a memoryless BSC, i.e. the one where all symbol errors are independent we may then put the probability P(y ¼ vju) of the event above as: Pðy ¼ vjuÞ ¼ pdH ðu;vÞ ð1

pÞn

dH ðu;vÞ

ð9:1Þ

Since p < 1/2 (otherwise we just interchange the designations of output ‘0’ and ‘1’), to reduce the probability of confusion of codewords u and v the Hamming distance between them should be as large as possible. Consider now Hamming distances dH (u, v) between all different code vectors of a code U. Denote the least among them as dH and call it the (minimum) code distance of a code U: dH ¼ min dH ðu; vÞ u6¼v; u;v2U

ð9:2Þ

Any codeword of U may appear as a transmitted one and to minimize the risk of confusing the two closest code vectors the distance between them, i.e. code distance dH , has to be maximal. We arrive thereby at the following assertion. Proposition 9.2.1. Code U is capable of detecting any td or fewer symbol errors (up to td errors) if and only if its code distance dH  td þ 1. Indeed, take a code with dH  td and pick out a pair of its closest code vectors u, v. If dH symbols of u different from those of v are corrupted, then u becomes v, meaning that a pattern exists of no more than td errors, which is not detectable. Conversely, if the distance between any code vectors exceeds td , no pattern of td or fewer errors can transform one codeword into another.

One may prove the following statement in the same way (Problem 9.4). Proposition 9.2.2. Code U is capable of correcting up to tc or fewer symbol errors if and only if its code distance dH  2tc þ 1.

281

Channel coding in spread spectrum systems

9.2.2 Linear codes and their polynomial representation Let us treat binary code symbols f0, 1g as elements of a binary finite field GF(2) (see Section 6.6) and consider symbol-wise linear operations over codewords of a code U obeying the arithmetic of GF(2). Clearly, there is only one non-trivial operation of this sort, namely symbol-wise GF(2) addition: u ¼ ðu0 ; u1 ; . . . ; un 1 Þ; v ¼ ðv0 ; v1 ; . . . ; vn 1 Þ

) u þ v ¼ ðu0 þ v0 ; u1 þ v1 ; . . . ; un

1

þ vn 1 Þ

For example, if u ¼ (100111) and v ¼ (010110), then u þ v ¼ (110001). Symbol-wise subtraction has no independent role and just repeats addition, since in GF(2) the negative of an element is the element itself. In the same way symbol-wise multiplication by a scalar from GF(2) (i.e. by 0 or 1) of any codeword either makes it zero vector or does not change it at all. A binary code U is called linear if the sum of any of its code vectors is again some code vector belonging to U. The name stems from the fact that such a code is a vector (linear) space over the field GF(2) [31,33,91], although this concept is not involved seriously in our further discussion. Any linear code U of length n contains zero vector (i.e. with n zero components) as a code vector, since the sum of an arbitrary code vector entering U with itself produces exactly zero vector: u þ u ¼ 0. The following statement explains one of the reasons why linear codes are of special interest. Proposition 9.2.3. The code distance of a linear code U is equal to the minimum Hamming weight over all non-zero codewords: dH ¼ min wH ðuÞ

ð9:3Þ

u2U u6¼0

To prove this just make a substitution dH (u, v) ¼ wH (u again a codeword of U.

v) in (9.2) and note that u

v ¼ u0 is

As (9.3) shows, there is no need to test all M(M 1)/2 different vector pairs to find code distance of a linear code containing M words. It is enough to ‘weigh’ M 1 nonzero code vectors, i.e. to perform M/2 smaller number of tests, which, considering the typically enormous number of words M, offers a highly significant gain. To get the idea of designing error-detecting codes of 2G and 3G wireless standards a polynomial description of linear codes is a good aid. Let us associate with a codeword u ¼ (u0 , u1 , . . . , un 1 ) the code polynomial u(z) of a dummy variable z arranged as: uðzÞ ¼ un 1 zn

1

þ un 2 z n

2

þ    þ u0

where by way of agreement we put z0 ¼ 1. This polynomial representation, which is widely used in coding theory, is just a form of the z-transform, underlying discrete

282

Spread Spectrum and CDMA

linear system analysis, discrete signal processing, digital filtering etc. [2,7]. One-to-one correspondence between sets of codewords and code polynomials means that the sum of two code polynomials u(z), v(z) is again a code polynomial of the same P of a linear code PU n 1 , v(z) ¼ i¼0 vi zi are code polynomials of words u, code. Specifically, if u(z) ¼ ni¼01 ui ziP n 1 v of a linear code U, u(z) þ v(z) ¼ i¼0 (ui þ vi )zi is a code polynomial of the word u þ v 2 U, where addition of coefficients follows the rules of the field they belong to, i.e. in our case GF(2). Polynomial arithmetic used in coding analysis and design includes two more operations: multiplication and division with remainder. The rules of these operations are universal regardless of the fields of polynomial coefficients, but dealing now with binary codes we use the terms of binary arithmetic. Consider an arbitrary (not necessarily a code one) binary (i.e. with coefficients from GF(2)) polynomial a(z). The highest power of z in this polynomial holding non-zero coefficient is called the degree of a(z) with symbolism deg a(z). Let a(z), b(z) be two binary polynomials and deg a(z) ¼ m, deg b(z) ¼ n. Then their product a(z)b(z) is a polynomial of degree m þ n obtained by extending the commutativity (zi a ¼ azi ) and distributivity laws to operations including a formal variable z and gathering together coefficients of equal degrees of z: aðzÞbðzÞ ¼ ðam zm þ am 1 zm

1

þ   þ a0 Þðbn zn þ bn 1 zn

¼ am bn zmþn þ ðam bn 1 þ am 1 bn Þzmþn ! m þn X k X ai bk i z k ¼ k¼0

1

1

þ   þ b0 Þ

þ  þ ða1 b0 þ a0 b1 Þz þ a0 b0

i¼0

Certainly, we put zm zn ¼ zmþn , all operations over ai , bi are performed in GF(2), and in the last internal sum coefficients ai , bi , whose indexes become negative or exceed the polynomial degree should be set equal to zero. Take for example binary polynomials a(z) ¼ z4 þ z3 þ 1, b(z) ¼ z2 þ z þ 1, then their product a(z)b(z) ¼ z6 þ z3 þ z2 þ z þ 1. The algorithm of dividing a dividend a(z) by the divisor b(z) with remainder looks as follows: aðzÞ ¼ qðzÞbðzÞ þ rðzÞ

ð9:4Þ

where q(z) is a quotient and r(z) is remainder. The uniqueness of q(z), r(z) is secured by relations deg a(z) ¼ deg q(z) þ deg b(z) and deg r(z) < deg b(z). The algorithm (9.4) is similar to the ‘school’ rule of dividing integers with remainder, the polynomial degree replacing a number magnitude. One of the techniques realizing this operation is ‘long division’, i.e. successive computation of remainder and division of it by a divisor until the remainder degree becomes smaller than the degree of the divisor. At the first iteration b(z) is multiplied by z raised to the power equalizing the degree of the product with that of a dividend a(z). Subtraction (equivalent to addition in GF(2)) from a(z) of the product obtained results in the first remainder, which at the second iteration plays the role of dividend, and so forth. Let us illustrate it by an example.

283

Channel coding in spread spectrum systems

Example 9.2.1. Suppose a(z) ¼ z 4 þ z 3 þ 1, b(z) ¼ z 2 þ z þ 1 and apply a long division algorithm:

2

z þz þ1



z4 þ

z2 þ 1

þ z3 þ 1

z4 þ z3 þ z2 z2 þ 1 þ z2 þ z þ 1 z

After two iterations we have q(z) ¼ z 2 þ 1, r (z) ¼ z so that division with remainder results in z 4 þ z 3 þ 1 ¼ (z 2 þ 1)(z 2 þ z þ 1) þ z.

Similar to integers, we say that a(z) is divisible by b(z) (or b(z) divides a(z)) when the remainder is zero, i.e. a(z) ¼ q(z)b(z). Consider now a linear code U of length n with all code polynomials divisible by the fixed polynomial g(z) of degree r51. Any code polynomial of U then has the form u(z) ¼ b(z)g(z), and since there are 2n r different factors b(z) securing the product degree no greater than n 1, such a code can include 2n r codewords at most. In fact, it is always in one’s power to go the reverse way and build up a code with this maximal number of words, i.e. transmitting k ¼ n r information bits, polynomial g(z) of a fixed degree r given. For that it is enough to use k ¼ n r data bits b0 , b1 , . . . , bk 1 as coefficients of a data polynomial b(z) ¼ bk 1 zk 1 þ bk 2 zk 2 þ    þ b0 and construct the corresponding code polynomial as a product u(z) ¼ b(z)g(z). Then 2k different data k-bit blocks are in one-to-one correspondence with the same number of code polynomials of degree no greater than n 1. The linearity of this code can be checked readily (Problem 9.11). Polynomial g(z) in such a construction is called the generator polynomial of U. Note that the number of redundant or check symbols of such a code always equals r, i.e. the degree of the generator polynomial. When a data polynomial b(z) is multiplied with the generator polynomial g(z) directly the codewords corresponding to polynomials u(z) ¼ b(z)g(z) are non-systematic, i.e. data bits in them are not explicitly seen. To come to a systematic code, in which, e.g., the last k binary symbols are information bits themselves and r ¼ n k first ones are check symbols, some rearrangement of codewords may be done. The complete set of codewords in so doing remains the same and only the mapping of data bits onto codewords alters. Let us multiply a data polynomial b(z) by zr ¼ zn k , coming to a polynomial zn k b(z) of degree no greater than n 1. If the remainder r(z) of its division by g(z) is discarded (just added to zn k b(z) in the binary case), it becomes divisible by a generator polynomial g(z), i.e. becomes a code polynomial. The last one: uðzÞ ¼ zn k bðzÞ þ rðzÞ

284

Spread Spectrum and CDMA

corresponds to a systematic codeword, since the data bits are exactly k senior coefficients of zn k b(z), and r(z), with degree smaller than r ¼ n k, cannot affect them. Example 9.2.2. Let us find a codeword of linear (5, 2) code with the generator polynomial g(z) ¼ z 3 þ z 2 þ 1, if data bits are b0 ¼ 1, b1 ¼ 1. Then b(z) ¼ z þ 1, z n k b(z) ¼ z 4 þ z 3 , having remainder r (z) ¼ z after division by g(z). Summation of z n k b(z) with this remainder leads to the code polynomial u(z) ¼ z 4 þ z 3 þ z ¼ zg(z) corresponding to a systematic word, with the two last symbols being data bits.

9.2.3 Syndrome calculation and error detection Suppose that word u of the linear code U is transmitted over the BSC. In an output binary observation y the elements distorted by the channel will differ from those transmitted, which may be written as: y¼uþe

ð9:5Þ

with e being the error vector, having zeros and ones at the places of undistorted and distorted symbols, respectively. For instance, if the word u ¼ (01011) from Example 9.2.2 is transformed by a BSC into the observation y ¼ (11110), the error vector e ¼ (10101). In the same way as codewords, observation y ¼ (y0 , y1 , . . . , yn 1 ) and error vector e ¼ (e0 , e1 , . . . , en 1 ) can be presented in the form of polynomials y(z) ¼ yn 1 zn 1 þ yn 2 zn 2 þ    þ y0 and e(z) ¼ en 1 zn 1 þ en 2 zn 2 þ    þ e0 . Then (9.5) takes the form: yðzÞ ¼ uðzÞ þ eðzÞ Let g(z) be the generator polynomial of U. Remainder s(z) after division of observation polynomial y(z) by g(z) is called the syndrome. Since any code polynomial is divisible by g(z), the syndrome repeats the remainder of dividing the error vector e(z) by g(z). Therefore, a non-zero syndrome always reports about the presence of errors in the observation y, and error detection may be implemented as calculating a syndrome for the observation y and deciding that error occurred whenever it is non-zero. Certainly, not all error patterns are detectable, and any undetectable error vector is always some code vector. Indeed, if e(z) is a code polynomial it is divisible by g(z) and the syndrome is zero. Conversely, zero remainder tells only that e(z) is divisible by g(z), but any polynomial of degree up to n 1 divisible by g(z) is a code polynomial. Example 9.2.3. Suppose that the transmitted codeword u ¼ (01011) of the (5,2) linear code is distorted by BSC into y ¼ (11001), i.e. two symbol errors occurred. Dividing y (z) ¼ z 4 þ z þ 1 by g(z) ¼ z 3 þ z 2 þ 1 results in a non-zero syndrome s(z) ¼ z 2 , signalling the presence of errors. On the contrary, if the observation were y ¼ (11101), corresponding to three corrupted symbols, the syndrome would appear zero: y (z) ¼ z 4 þ z 2 þ z þ 1 ¼ (z þ 1)g(z), failing to detect such an error pattern.

Channel coding in spread spectrum systems

285

Sometimes the ability of a linear code to detect errors is characterized by the share of undetectable error patterns among all error patterns. Since there are 2n possible error vectors altogether and only those repeating 2k code vectors are undetectable, the share above is 2 (n k) ¼ 2 r . The linear codes just discussed and built on the basis of generator polynomials are known as cyclic codes or shortened cyclic codes. When used to only detect (not to correct) errors, they are often called cyclic redundancy codes (CRC).

9.2.4 Choice of generator polynomials for CRC The share of undetected errors drops exponentially with the number of check symbols, which may motivate using generator polynomials of high degrees. It should be remembered, however, that check symbols present an overhead and increasing their number above some reasonable level may be wasteful. CRC are typically used on higher system protocol layers for checking the quality of data frames retrieved on the physical layer, i.e. after resources of much more powerful error-correction codes have already been utilized. Thanks to that, symbol errors met by CRC are rather rare and it is quite unlikely that in the codeword with hundreds of symbols more than a few errors happen. Thus, detection of up to three errors per codeword may often be considered satisfactory. Let us describe the procedure of designing CRC meeting this requirement. Take a binary primitive polynomial g1 (z) of degree m (see Section 6.6). An important fact proved in algebra of extended fields is that a primitive polynomial of degree m never divides any binomial zl þ 1 of non-zero degree l < 2m 1 [30,32]. Then we may prove the following statement. Proposition 9.2.4. A linear code U with the generator polynomial g(z) ¼ (z þ 1)g1 (z) of degree m þ 1 detects up to three errors whenever its code length n  2m 1. Because of the linearity of U (see (9.3)) and Proposition 9.2.1 it is only necessary to prove that the minimal weight of a non-zero word of U is no smaller than four. Every code polynomial u(z) being divisible by z þ 1 may be written as u(z) ¼ q(z)(z þ 1). Although z is a formal variable, the latter equality should hold after substituting z ¼ 1 in both its parts, resulting in u(1) ¼ un 1 þ un 2 þ    þ u0 ¼ 0, which means evenness of the number of non-zero elements of a word, i.e. evenness of its weight. Assuming the existence of a word of weight two with nonzero ith and jth symbols (j > i), we have a code polynomial u(z) ¼ z j þ z i ¼ z i (1 þ z j i ) not divisible by g1 (z), since the latter, being irreducible, cannot have z as a factor and does not divide 1 þ z j i (j i < n  2m 1) due to primitivity. Hence, the smallest weight of a non-zero word of U is four.

The choice of appropriate CRC generator polynomial is now straightforward. If the desirable code length is n, then one should just find a primitive polynomial g1 (z) of degree m  dlog2 (n þ 1)e and the generator polynomial g(z) ¼ (z þ 1)g1 (z) is ready. CRC of this type are nothing other than quite popular Hamming codes (shortened whenever n < 2m 1) with all odd-weight words removed. In alternative applications they are used to correct any single and detect any double errors.

286

Spread Spectrum and CDMA

Example 9.2.4. Several CRC are used in 2G and 3G specifications [18, 69, 92]. The exemplary one entering all three standards (cdmaOne, UMTS and cdma2000) has the generator polynomial g(z) ¼ z 16 þ z 12 þ z 5 þ 1 ¼ (z þ 1)g1 (z), where g1 (z) ¼ z 15 þ z 14 þ z 13 þ z 12 þ z 4 þ z 3 þ z 2 þ z þ 1 and is primitive. Similarly, generator polynomials of other CRC of those standards (of degrees 30, 24 etc.) are factored into the binomial z þ 1 and a primitive polynomial.

9.3 Convolutional codes Convolutional codes are in common use in modern telecommunications as an effective tool for securing reliable data transmission over noisy channels. Belonging to a more general class of tree codes, they are distinguished inside it by the linearity of the encoding algorithm. The difference between convolutional and block codes is rather fuzzy: any convolutional code may be thought of as a block code of a properly large length. It is more satisfactory to see the peculiarity and the reason for the extreme popularity of convolutional codes in their recurrent nature, which allows a much more feasible error-correction decoding procedure (Viterbi algorithm) as compared to the others.

9.3.1 Convolutional encoder The idea of a convolutional encoding may in general terms be described as follows. Take a block (vector) of c consecutive bits of a source and convert it linearly into n > 1 output binary code symbols occupying time space of one source bit. The linearity as applied to vectors with components from GF(2) means just modulo 2 summations of selected components. After this, update a block of source bits, inserting one new bit and discarding the oldest. We again have a block of c source bits, this time lagging the initial one by one bit (and containing c 1 former bits and a new one), which is encoded to the new n code symbols. These steps are continuously executed one by one, each time involving a new bit and dropping the oldest. Figure 9.2, where c ¼ 3, n ¼ 3, illustrates the procedure: the encoder watches a source bit stream through the sliding window of width c and encodes all bits currently seen into n code symbols. After every step the window moves by one source bit and the next step is accomplished. The number of source bits c determining the νc bits window

One bit duration Bit stream

Codestream n code symbols

n code symbols

Figure 9.2

Convolutional encoding

n code symbols

287

Channel coding in spread spectrum systems

Source bits b0, b1, ...

1

+ 1 u01, u11, ...

νc – 1

2

+

+

2

n

u0n , u1n , ...

u02, u12, ...

Code symbols u01, u20, ..., u0n, u11, ...

Figure 9.3 Convolutional encoder

code symbols at one step is called the constraint length. The principle described can be implemented as shown in Figure 9.3, where the shift register containing c 1 flip-flops stores c 1 previous source bits. Along with the incoming bit, they are fed into the linear logic circuit consisting of n modulo 2 adders. The output of every flip-flop and encoder input may or may not be connected to each adder (that is why the links are marked as dashed lines), the scheme of connections determining the concrete dependence of output code symbols on c source bits, i.e. the encoding rule. With a current source bit bi arriving at the input n code symbols u1i , u2i , . . . , uni appear in parallel at the adders’ outputs. After every clocking, the bit pattern in the register shifts to the right by one cell, preparing the circuit to generate the next n code symbols. The output switch running through n positions during one bit space converts the code symbols from a parallel to a serial pattern, creating an output codestream u10 , u20 , . . . , un0 , u11 , u21 , . . . , un1 , . . .. It is seen that the encoder of Figure 9.3 in the steady state responds to every new source bit by n code symbols (see also Figure 9.2), so that its code rate Rc measured in bits per code symbol is 1/n. The example below helps to explain better the principle of convolutional encoding. Example 9.3.1. Figure 9.4 illustrates the implementation of the convolutional encoder with the constraint length c ¼ 3 and rate Rc ¼ 1/2. Input bits b0 , b1 , . . . produce two streams of code

+ u01, u11, ... Source bits

Code symbols

b0, b1, ...

u02, u12, ...

+ Figure 9.4

Convolutional encoder of rate 1/2

u01, u02, u11, u21, ...

288

Spread Spectrum and CDMA

symbols u01 , u11 , . . . and u02 , u12 , . . ., which are then multiplexed so that ui1 and ui2 occupy, respectively, even and odd positions in a common codestream. For instance, a bit stream fbi g ¼ 10100100 . . . produces sequences fui1 g ¼ 11011111 . . . and fui2 g ¼ 10001101 . . . which are then multiplexed into a codestream f(ui1 , ui2 )g ¼ 1110001011111011 . . ..

The following question sounds natural: are rates Rc other than 1/n, i.e. equal to k/n, where 1 < k < n, possible with convolutional encoding? There are two classical ways of solving this task. The first of them just generalizes the principle above: at every step k c bits rather than vc are linearly transformed into n code symbols, after which k oldest bits (instead of one) are replaced by k new ones and the encoder proceeds to the next step. The second way, called puncturing, uses rate 1/n code as the raw material and removes some of its code symbols according to a pre-assigned pattern. The puncturing, when arranged properly, reduces the number of code symbols per data bit, providing rate k/n. For reasons of implementation feasibility puncturing is frequently considered preferable, accentuating further a dominant interest towards the codes of rate 1/n. We will follow this line and focus further only on the convolutional codes of rate 1/n. Clearly, a circuit including a shift register and an individual modulo 2 adder with all its connections is nothing but an FIR filter (see Figure 6.20) outputting the convolution of the input bit stream with the filter pulse response, which explains the name of the codes under study. This also underlies one of the convenient ways to describe formally a convolutional encoder. The convolution relating a code symbol uli (i.e. appearing at the lth adder output when a bit bi arrives) to the input bit stream is: uli ¼

X c 1 t¼0

bi t glt ; i ¼ 0; 1; . . . ; l ¼ 1; 2; . . . ; n

ð9:6Þ

where glt ¼ 1 if the lth adder is connected to the tth flip-flop (t ¼ 0 corresponds to the encoder input) and glt ¼ 0 otherwise; bi ¼ 0 whenever i < 0. An appropriate frequencydomain instrument for discrete systems is z-transform, which was mentioned in the previous section. A convolution corresponds in the z-domain to a product of z-transforms, so that (9.6) takes an equivalent form: ul ðzÞ ¼ where b(z) ¼

P1

i¼0

1 X i¼0

uli zi ¼ bðzÞgl ðzÞ; l ¼ 1; 2; . . . ; n

ð9:7Þ

bi zi is a z-transform of an input bit stream and: gl ðzÞ ¼ gl0 þ gl1 z þ . . . gl c 1 z c 1 ; l ¼ 1; 2; . . . ; n

ð9:8Þ

is a transfer function of the lth FIR filter (i.e. forming the lth code symbol) called also the lth generator polynomial of a convolutional code. The set of n generator polynomials determines a convolutional code exhaustively, since their non-zero coefficients specify connections of adders with a shift register.

289

Channel coding in spread spectrum systems

Example 9.3.2. The encoder shown in Figure 9.4 has generator polynomials g1 (z) ¼ 1 þ z þ z 2 and g2 (z) ¼ 1 þ z 2 . Make sure that sequences of code symbols cited in Example 9.3.1 may be obtained from (9.7).

Putting g1 (z) ¼ 1 leads to a systematic convolutional code, in which bits of source data are directly seen on definite positions. The trouble, however, is that within the fixed structure of Figure 9.3 systematic codes are usually not the best ones as regards error correction capability (see Problem 9.15). This underlies modifying the shift register of a convolutional encoder to a feedback structure when the systematic property is critical. We will have to revisit this matter in more detail on familiarizing ourselves with turbo codes in Section 9.4.1.

9.3.2 Trellis diagram, free distance and asymptotic coding gain The shift register of a convolutional encoder has 2 c 1 possible states and there are only two states where it can pass from a current state after clocking. It is an incoming source bit bi that selects one of these two paths. When a state of the register on the ith clock interval is (bi 1 , bi 2 , . . . , bi c þ1 ), then the next state will be either (0, bi 1 , . . . , bi c þ2 ), if the incoming source bit bi ¼ 0, or (1, bi 1 , . . . , bi c þ2 ), if bi ¼ 1. Similarly, the register comes to the state (bi , bi 1 , . . . , bi c þ2 ) if the previous state was either (bi 1 , bi 2 , . . . , bi c þ2 , 0) or (bi 1 , bi 2 , . . . , bi c þ2 , 1). To depict schematically all these details of register behaviour the trellis is an appropriate tool. It includes two columns of 2 c 1 nodes, the left column for the current state and the right for the next one. The branches (arrows) go out from each node of the left column to two nodes of the right, solid and dashed branches showing paths selected by incoming bit zero and one, respectively. In the same way, two branches enter every node of the right column, being both either solid (zero input bit) or dashed (input bit equalling one). Every branch is labelled by an n-tuple which is nothing but a group of n code symbols issued by the encoder when an input source bit directs it from one state to another. The example below clarifies the method of building the trellis for the convolutional encoder of Figure 9.4. Example 9.3.3. The four states of a two-cell register starting with the left flip-flop are: (00), (10), (11) and (01). Figure 9.5 presents the trellis built as described. For instance, the branch from (00)

00

(00)

11 (10)

11

(01)

01

00 10

(10)

(01)

01 (11)

10

(11)

Figure 9.5 Trellis of encoder of Figure 9.4

290

Spread Spectrum and CDMA

(10) to (01) is solid, while the one to (11) is dashed, code symbols 01 label the branch leading from (11) to (01), since with ones in both cells and zero input bit the upper adder outputs zero, while the lower outputs one, etc.

During every clock interval the encoder moves along some branch of a trellis issuing code symbols labelling the branch. Tracing this process in a diagram presented as in Figure 9.5, one has to jump from the right column to the same node in the left column at every next step. To escape this, let us just repeat the trellis as many times as is wished using the right column of the current step as the left one for the following step. Then encoding will be identified with a motion along the obtained trellis diagram, the current input bit directing the encoder along a solid or dashed branch depending on whether it is zero or one. To illustrate this, let us turn to Figure 9.6, which presents a trellis diagram for the code of Example 9.3.1. Every candidate sequence of input data bits selects a specific path on the trellis diagram, which we may trace, e.g. for the sequence fbi g ¼ 10100100 . . .. Its first bit is 1, which directs the encoder from the node (00) to the node (10), issuing output code symbols 11; the second bit 0 transfers the encoder from (10) to (01), generating code symbols 10; the third changes the state from (01) to (10), outputting 00 and so forth. The thick line shows the resulting codeword: 1110001011111011. It was already noted that one might treat a convolutional code as the block one of a properly long length. The codewords of this latter block code are just different paths on the trellis diagram, the minimum Hamming distance over all pairs of them giving a code distance. In its turn, the code linearity simplifies the task of finding code distance: on the strength of Proposition 9.2.3, the minimum distance between paths is the least Hamming weight over all non-zero words. Suppose now that an encoded bit stream is terminated after some large enough (no smaller than c ) number of bits and padded by c 1 tail zeros to set the register to the all-zero state. Realized practically (one example is cdmaOne), this padding would not insert a material overhead whenever the length of an encoded bit stream is many times larger than the constraint length. On the other hand, the padding makes all the paths converge to the all-zero register state, as Figure 9.6 shows for the code of Example 9.3.1. If we take a padded bit stream starting

(00)

00 11

00

00 11

11

00

11

11

00

11

11

00

11

11

00

11

00

11

(10) 00 10

10 (01)

01

(11)

Figure 9.6

00 10

00 10

00 10

01 01

01 01

01 01

01 01

10

10

10

10

10

01

Trellis diagram of encoder of Figure 9.4

11

291

Channel coding in spread spectrum systems

with some number n0 of zeros followed by bit ‘1’ and replace these n0 initial zeros to the end of the stream, we just move a corresponding path on the diagram by n0 steps to the left with no change of its weight. After such a shift the path diverges from the zero path at the very first step and merges with it no later than n0 steps before the last tail zero. Along this path several returns to zero and further diverging may happen (see Figure 9.7), each of them only increasing the path weight. Since the objective is to find the minimum weight, any deviations from the zero path but the first one should be ignored. Summarizing, we conclude that to find the distance of a convolutional code one ought to investigate only the paths deflecting from the zero path at the origin of the trellis diagram and having no deviation from the zero path after the first merging with it. In the theory of convolutional codes this entity is traditionally called the free distance. Denoting it df we see, for example, that among all the paths in Figure 9.6 with only a single deviation from the zero path the codeword 11101100 . . . encoding a bit stream 100 . . . has minimal weight, so that df ¼ 5. Certainly, free distance df guarantees j k d 1 correcting any f 2 symbol errors (see Proposition 9.2.2); however, typically many

patterns with a greater number of errors are corrected, too. There are only a few examples of effective algebraic rules for convolutional encoding. The majority of known convolutional codes with good correction capability are found by a computer search [31,33,93]. Due to the specificity of the encoding algorithm, finding all possible weights of words (weight spectrum) of an arbitrary convolutional code proves to be not so analytically difficult as it is for many linear block-codes. In particular, directly from the trellis (or, equivalently, state diagram) a system of linear equations is made up, the solution of which leads to an explicit expression for a weight spectrum [2,7,93]. Coding gain, which shows how many times signal energy per bit or signal power can be reduced as a result of encoding, error probability fixed, is a universal measure to characterize the efficiency of one or other code. We discussed this notion in Section 2.6 applied to orthogonal signalling and noted that the asymptotic coding gain for the case of the AWGN channel is the gain in Euclidean distance. With BPSK transmission every discrepancy in symbols of two signals adds to their squared Euclidean distance 4Es , where Es is symbol energy. There is a pair of words of a convolutional code having df different symbols and no pair with smaller discrepancy (Hamming distance). Therefore, the minimum squared Euclidean distance between BPSK-mapped convolutional code2 words dmin, cc ¼ 4df Es . At the same time (see Section 2.6) a similar quantity for uncoded 2 transmission dmin, u ¼ 4Eb , resulting in asymptotic coding gain of a convolutional code: Ga ¼ Zero path

First diversion

2 dmin; cc 2 dmin; u

¼

df Es ¼ df Rc Eb First merging

Second merging

Second diversion

Figure 9.7 Diversion and merging of paths

292

Spread Spectrum and CDMA

code rate Rc being measured in bits per symbol. For the code of Example 9.3.1 Rc ¼ 1/2, df ¼ 5, so that Ga ¼ 2:5 or about 4 dB. We remember once again that Ga is derived for the AWGN channel (not BSC!); in other words, for the case of soft decoding. Hard decoding degrades this figure by 2–3 dB depending on code parameters and symbol SNR [31,33].

9.3.3 The Viterbi decoding algorithm As was mentioned, among the reasons for the great popularity of convolutional codes the existence of a feasible decoding algorithm is of special importance. Let us begin with the following statement. Proposition 9.3.1. The ML hard error-correction decoding of a binary code is equivalent to the minimum Hamming distance rule: ^ ; yÞ ¼ min dH ðu; yÞ ) u ^ is declared the received word dH ðu u2U

ð9:9Þ

As one can see, the rule is very similar to (2.3) with a single change: in the case of BSC the Hamming distance replaces the Euclidean one, adequate for the AWGN channel. To prove (9.9) it is enough to note that (9.1) rewritten as: pðyjuÞ ¼ p

dH ðu;yÞ

ð1



n dH ðu;yÞ

¼



p 1

p

dH ðu;yÞ

ð1

pÞn

is nothing but the BSC transition probability, i.e. the probability for the sent code vector u of length n being transformed by BSC into a binary observation y. Since the crossover probability of BSC p < 0:5, the transition probability p(yju) is a decreasing function of the Hamming distance from an observation y at the BSC output to a code vector u, and, therefore, the ML ^ is the one closest to y by the Hamming distance. codeword u

A direct realization of (9.9) for an arbitrary code appeals to comparison of M Hamming distances from y to all codewords. Since M is typically quite large such a solution might appear infeasible. On the contrary, because of the beneficial structure of convolutional codes the ML decoding is not a big technological challenge, at least if the constraint length is moderate. The Viterbi decoding procedure implements the ML strategy in a recurrent, step-by-step form of searching a path on the trellis diagram closest to the binary observation y. Every new decoding step starts with the arrival of the next group of n observation symbols. At the ith step the decoder calculates the distance of n incoming observation symbols from every branch of a trellis diagram and increments the distances for all paths calculated over the i 1 previous steps. One might work out the distances for an arbitrary code similarly, as new observation symbols arrive, but it is the recurrent nature of a convolutional code that makes this routine computationally economical due to the immediate discarding of many paths at each step.

293

Channel coding in spread spectrum systems

B A

C Steps:

Figure 9.8

i–1

i

i+1

Paths going through node A at the ith step

Consider all paths passing through a fixed node A at the ith step, as shown in Figure 9.8. Continuation of any path after the ith step does not depend on the route of arriving at A, so that different paths reaching A may further merge with each other. But this means that of all the paths going through A and continuing the same way after the ith step the one having minimum distance from y up to the ith step will remain closest to y forever, since a common continuation adds an equal contribution to all distances! Why then go on with computing distances for the rest as soon as it is clear that they have no chance of finally appearing closest to the observation? Instead we discard them, retaining only the one reaching the node A with minimum distance. This latter is called a survivor and for the time being we believe that there is only a single survivor for every node of the trellis diagram at the ith step (see comments below). The current, i.e. calculated over all observed symbols up to the ith step, distance of the node A survivor from y is called the node metric of A. Now recall that there are only two branches entering any node; Figure 9.8 shows this for some node A. Two branches enter it from two nodes B, C of the previous step and, therefore, continue the survivors of B and C. We may calculate the distances of two paths reaching A by just measuring the branch metrics, i.e. the distances of branches from the arriving group of n observed symbols, and adding them to the node metrics of B and C. The path with smaller distance is declared the survivor of A and is recorded in memory along with its distance (node metric) while the other is discarded. On performing these operations for all nodes of the trellis diagram the decoder proceeds to the next step. To summarize briefly, the Viterbi decoder calculates branch metrics at every step, adds them to all the node metrics accumulated before and then sifts out the more distant of two paths leading to every node. Since there are 2 c 1 nodes (i.e. register states) altogether, the complexity of the decoder is determined only by the constraint length c and remains fixed independently of the theoretically unlimited number of codewords (paths). Coming back to our assumption on the uniqueness of a survivor for every node, note that since Hamming distance is integer, the probability always exists that two paths leading to the same node have equal current distances from y. Different strategies are possible to solve ambiguity of this sort. One of them is just a random choice: assigning tails of a fair coin to one of the paths and declaring this one the survivor if tails really falls after flipping the coin. This certainly violates the decoding optimality, although the accompanying energy loss is typically insignificant. Alternatively, both competitive paths may be declared survivors and recorded in memory until further steps remove the ambiguity. The latter option preserves decoding optimality at the cost of involving extra memory.

294

Spread Spectrum and CDMA

Example 9.3.4. Consider decoding the observation y ¼ 0100110000 . . . for the code of Example 9.3.1. Figure 9.9 illustrates the process with node metrics placed immediately near the nodes, frames containing the pairs of observation symbols arriving at the current step. The decoder starts the process assuming zero (i.e. (00)) initial state of the encoder register. The starting

(00) (10) (01) (11)

(00) (10) (01) (11)

(00) (10) (01) (11)

00 11 11 00 10 01 01 10 Step: 00 11 11 00 10 01 01 10 Step: 00 11 11 00 10 01 01 10 Step:

01 00 11 1 1 0 1 2 1 3 1 1 2 1 2 1

2

00 3

2 5 4 3 2 4 2 4

2 1

2 1 4 4 3 4 3

3 3

3

4

00 2

3 2 2 5

00

2 4 4 2 4 3 4 3

2

2 3 3 00 2

3 3 3 7

2 5 4 3 4 4 4 4 00

(00) (10) (01) (11)

00 11 11 00 10 01 01 10 Step:

2

2 6 4 4 4 5 4 5

3 4 4 8

00 (00) (10) (01) (11)

00 11 11 00 10 01 01 10 Step:

Figure 9.9

2

2 6 4 4 5 5 5 5

4 4 4 9

Dynamics of decoding for the convolutional code of Example 9.3.1

6

2 5 4 3 3 4 3 4

Channel coding in spread spectrum systems

295

c 1 ¼ 2 steps correspond to transient behaviour of the encoder register, when only one branch enters every state (see Figure 9.6) and so all paths are survivors. At the first step the decoder compares the first group of n ¼ 2 observation symbols with two branches emanating from the state (00). According to their Hamming distances from the observed symbol group 01, both the solid and dashed lines obtain metric 1, shown near the branches. Consequently, the node metrics of the two nodes, at which the branches arrive, both become equal to one. At the next step the distance is measured between the second group of observation symbols 00 and two pairs of branches emanating from nodes (00) and (10), resulting in the metrics labelling the branches. Added to the node metrics of the previous step, they update the metrics of nodes (00) and (10) and produce the metrics of two more nodes (01) and (11). Starting with the third step two branches enter any node of a trellis diagram of Figure 9.6, meaning that the decoder must decide which of them is a survivor. We do not show in Figure 9.9 the metrics of the branches beginning with this step in order to avoid clutter. As is seen, there are two paths leading to the node (00) at the third step. Their distances from the observed symbols 010011 are 3 and 2, respectively. The first is not a survivor and the decoder discards it along with its metric, so it is crossed out and not present at the plot of the next step. The second is a survivor, and is recorded in memory with its metric until the next step. In the same way, the decoder finds the survivors for the rest of the nodes. The decoding proceeds similarly at further steps, storing in memory only 2 c 1 ¼ 4 survivors, and every plot of Figure 9.9 depicts only the paths declared survivors at the previous step. At step 7 the decoder first runs into the problem of ambiguity: two paths arrive at the node (01) with equal distances, and the same occurs with the node (11). The choice of survivors illustrated by the figure reflects some realization of flipping a fair coin. The same events happen at steps 8 and 9. The reader is encouraged (Problem 9.19) to make sure that any alternative resolving of the ambiguity will not change the final result of decoding except for the step number when the decoded bits are first released (see below). The situation after the ninth step is very important: all paths appear to merge with each other up to the seventh symbol group. Whatever happens afterwards, this part of all merging paths will remain common forever, meaning that the data bits corresponding to it may be released right away as decoded ones. Hence, the decoder produces the decoded data 1000000. Comparing the codeword u ¼ 11101100000000 . . . corresponding to it with the observation y ¼ 0100110000 . . . we may note that the Hamming distance between them is 2, and if a transmitted word was really the one declared by the decoder, two errors were corrected, in full consistence with free distance df ¼ 5. Similar situations will arise at further steps, allowing the decoder to release decoded bits in the course of processing an observation symbol stream.

Certainly, outputting the decoded data at random moments of the merging of survivors, as in the example above, looks impractical, and a more regularly arranged procedure is desirable. It has been repeatedly verified by experiments and simulation that during the ith decoding step the merging part of all survivors almost never ends after the data bit number i 5 c , so the decision on every bit may be regularly output with delay 5 c [94]. A very significant feature of convolutional codes making them even more attractive is the comparative simplicity of implementing soft decoding. In a general case of a block code with M words the soft decoding means direct calculation of M Euclidean distances or correlations, no algebraic tricks like syndrome decoding being available. With a

296

Spread Spectrum and CDMA

gigantic M typical of many applications this often makes the task completely infeasible. At the same time the penalty for simplifying the receiver using a hard decoder is energy loss varying for the AWGN channel around 2 dB: a figure today considered pretty significant. Turn now to the Viterbi algorithm and replace the Hamming distance in it by a (squared) Euclidean one. Obviously, it converts the decoding into a soft one, optimal for the AWGN channel. The branch and node metrics then become just the corresponding Euclidean distances (or correlations). Such a modification by no means affects the implementation advantages of the Viterbi algorithm. Indeed, the node metrics are calculated in a recursive way as before through step-by-step incrementing by branch metrics, and the path entering a node with worse metric than the other may again be discarded at every step as a non-survivor. Certainly, digital realization of decoders is mostly appropriate, presuming quantizing input observation. It is a conventional trend to classify decoders of binary codes involving quantization with more than two levels as soft ones. A profound analysis shows that in the majority of cases 3-bit (8-level) quantization is enough to achieve almost the potential (characteristic of continuous processing) performance [94].

9.3.4 Applications Many efficient convolutional codes are now known and the range of their telecommunication involvement is extremely vast. In particular the 2G cdmaOne and 3G UMTS standards exploit codes of constraint length c ¼ 9 and rates Rc ¼ 1/2, Rc ¼ 1/3 providing asymptotic coding gain about 7.8 dB [18,69,92]. The 3G cdma2000 standard, in addition to those above, employs the code with parameters c ¼ 9, Rc ¼ 1/4. Beyond their own significant value convolutional codes constitute the basis for turbo codes, which near the Shannon limit on data transmission reliability. These are discussed briefly in the following section.

9.4 Turbo codes As we mentioned in Section 9.1, despite a very strong endeavour for decades following the advent of Shannon’s information theory the attempts to find regular coding rules securing reliable data transmission near channel capacity remained unsuccessful. In this light, the discovery of turbo codes in 1993 was a fascinating breakthrough, first met by the communications community with understandable disbelief. Nowadays, however, turbo codes are widely recognized as a very efficient means of high-quality communications especially at low SNR per data bit. An accurate and compact theory of this class of codes remains something of a holy grail; intuition combined with extensive computer search has played a significant role in obtaining many results up to now.

9.4.1 Turbo encoders The other name of turbo codes is parallel concatenation convolutional codes, which reflects the core idea of the encoding algorithm: two parallel (component) convolutional encoders encode the same source data bit stream [95,96]. The component encoders are as

297

Channel coding in spread spectrum systems

a rule identical, i.e. have the same constraint lengths and sets of generator polynomials. The first of them encodes the data directly, and before arriving at the second the data bit stream undergoes interleaving. This operation just permutes the data bits in a pseudorandom fashion within a block of fixed length I. As was noted in Section 9.3.1, among the convolutional codes based on the FIR structure of Figure 9.3, there is no equivalence between systematic and non-systematic codes, non-systematic ones being typically more powerful as to the distance properties. At the same time, the decoding principle associated with turbo codes and imparting special attractiveness to them appeals to systematic component encoders. Exploiting infinite impulse response (IIR) in place of the FIR structure opens the way to forming a systematic convolutional code containing the same words, and therefore having the same distance properties as the non-systematic code. To explain it, start with the encoder of Figure 9.3 described by a set of generator polynomials gl (z), l ¼ 1, 2, . . . , n and establish a one-to-one mapping between two bit streams b(z) and b1 (z) as b(z) ¼ b1 (z)g1 (z). Turn then to equation (9.7) and see that for an input bit stream b1 (z) it may be written in the form: ul ðzÞ ¼ b1 ðzÞgl ðzÞ ¼

bðzÞ gl ðzÞ; l ¼ 1; 2; . . . ; n g1 ðzÞ

ð9:10Þ

showing that the structure capable of dividing source bit stream b(z) by g1 (z) before inputting the FIR scheme of Figure 9.3 would encode b(z) into the same convolutional codewords as the FIR encoder itself. The only difference is that the codeword assigned earlier to b1 (z) is reassigned now to b(z), which—considering the equal rights of any source bit streams—is of no significance as soon as the decoder knows this new correspondence order. But after such an operation all the codewords become systematic, since u1 (z) ¼ b(z)! The feedback register in Figure 9.10 implements the division by g1 (z) ¼ g1r zr þ g1r 1 zr 1 þ    þ 1, where r ¼ c 1. Indeed, according to the general rule

+

+ 1

1

g1 b(z)

+

1

g2 νc – 1

2

(b0, b1, ...) b(z) g1(z) Check symbol logic u20, u21, ...

u0n, un1, ...

u10, u11, ...

Code symbols

Figure 9.10 Systematic convolutional encoder

1

gr

298

Spread Spectrum and CDMA

applicable to any linear system (one example of it is (8.26)), the z-domain transfer function hf (z) of the closed feedback loop is expressed (using equivalence of addition and subtraction in binary arithmetic) as [2,7]: hf ðzÞ ¼

hðzÞ 1 þ ðzÞhðzÞ

h(z) and (z) being the transfer functions of the open loop and feedback circuit, respectively. Considering the output of the leftmost adder of Figure 9.10 as the output of a closed loop, we have h(z) ¼ 1, (z) ¼ g11 z þ g12 z2 þ    þ g1r zr so that hf (z) ¼ 1/g1 (z). Since the divided bit stream b(z)/g1 (z) is present directly at the register input, the check symbol logic fixed by polynomials gl (z), l ¼ 2, . . . , n may be connected to the same register for a further ordinary convolutional encoding. Summarizing, in a systematic feedback encoder a source bit stream gives directly a stream of data bits u1 (z), while check symbol streams ul (z), l ¼ 2, . . . , n are formed by the same logic as in Figure 9.3 but connected to the feedback register. Figure 9.11 presents the example of transforming the non-systematic encoder of Figure 9.4 to a systematic form. The complete structure of a turbo encoder includes two such systematic encoders and an interleaver, as is shown in Figure 9.12 for the component encoders of rate Rc ¼ 1/2. The ‘direct’ data bits from the second component encoder are discarded and only its check bits

+ Source bits b0, b1, ...

+ +

u02, u21, ... Code symbols u01, u02, u11, u12, ... u10, u11, ...

Figure 9.11 Systematic convolutional encoder for the code of Example 9.3.1

u1i = bi Source bits bi

Convolutional encoder

Code symbols 2 ui

3

ui Interleaver

Convolutional encoder

Figure 9.12 Turbo encoder

299

Channel coding in spread spectrum systems

are used. Thus, if the component convolutional codes are of rate Rc ¼ 1/2, the resulting turbo code contains two check symbols u2i , u3i per data bit bi , i.e. has the rate Rc ¼ 1/3. If desired, its rate may be increased to 1/2 by transmitting only one check symbol per data bit taken alternately from the component encoders. The interleaver permutes data bits within the block of length I. Typically c 1 tail bits are used to set the first component encoder to zero and a turbo code is treated as the block code carrying I information bits.

9.4.2 Iterative decoding Although a turbo code consists of two convolutional codes its optimal decoding cannot be realized as two independent Viterbi procedures, since the paths on the component trellis diagrams are related to each other via the same (though interleaved) encoded data. The pioneers of turbo coding [95,96] proposed the use of an iterative version of the maximum a posteriori probability (MAP) rule applied not to a codeword but instead to every information (not check!) bit. Its description below presents only a general idea; the reader curious about details may consult [96,97]. A posteriori probabilities p(bi ¼ 0jy) and p(bi ¼ 1jy) show the likelihood of one or the other value of the ith data bit calculated on the basis of observation vector y. They concentrate in themselves complete knowledge about bi delivered by y and extracted from it. In the case of reliable communication, one of these probabilities is close to unity, while the other is almost zero. Naturally, a MAP decoder will output as an estimation b^i of the ith data bit the value with greater a posteriori probability, following the rule: Li ¼

pðbi ¼ 0jyÞ b^i>¼0 1 pðbi ¼ 1jyÞ ^< bi ¼1

ð9:11Þ

The recurrent algorithm for calculating bit a posteriori probability was developed in [98]. In the case under study the data bit bi is physically present in observations due to systematic encoding. On the way forward the recurrent MAP algorithm computes a posteriori probability of bi using all observations before and including this bit. After all the observation samples are received it goes back and refines the results, incorporating information extracted from the observations arriving later than bi . Thus, after passing forwards and backwards, the a posteriori probabilities for all data bits may be found. To run this algorithm one needs the trellis of the code, channel transition probability and a priori probability distributions q(bi ) for every data bit. Certainly, there would be no problem in applying it individually to each of the two component convolutional codes constituting a turbo code. The core of the turbo code, however, is encoding the same permuted data by the two component codes, so that information about bi could be retrieved from both of them jointly. The iteration process arranged as shown in Figure 9.13 meets this demand. The complete observation vector at the receiving side may be split into three vectors: yl ¼ ul þ nl , l ¼ 1, 2, 3, where u1 ¼ (u10 , u11 , . . . u1M 1 ), u1i ¼ bi is the vector of data bits bi directly present in any codeword due to the systematic character of turbo codes, u2 , u3 are vectors of redundant symbols of the first and second component encoders, respectively, and nl are vectors of independent noise samples. At the first step the decoder of the first component code calculates a posteriori probabilities p1 (bi jy1 , y2 ) of all I data bits bi using observations y1 , y2 associated with the data

300

Spread Spectrum and CDMA

1

qn(bi)

Deinterleaver 2

qn(bi) y2

First code decoder

Interleaver

Second code decoder

Λi > 1
tc errors? Find the number of binary vectors having weights no greater than td (volume of a binary sphere of radius td ). Using the result of Problem 9.6 prove the Gilbert bound: a binary block code detecting up to td errors always exists whenever: ðM

9.8.



td X

Cni < 2n

i¼0

where M, n are the number of codewords and code length, respectively. Calculate the result of the following operations over binary polynomials: f ðzÞ ¼ ðz3 þ z2 þ 1Þðz4 þ 1Þ

ðz2 þ 1Þ2 ðz3

i

1Þ þ z6 þ z2

9.9. Open the brackets in the binary polynomial (z þ 1)2 where i is a positive integer. 9.10. Find the remainder of dividing z5 þ z3 þ 1 by z2 þ z þ 1 over GF(2). 9.11. Let g(z) be a binary polynomial of degree r. Prove that the binary block code of length n using this generator polynomial (having code polynomials u(z) ¼ b(z)g(z), data polynomials b(z) being arbitrary binary polynomials of degree no greater than n r 1) is linear. 9.12. The binary polynomial g1 (z) ¼ z4 þ z þ 1 is primitive. What is the largest length of CRC detecting up to three errors based on this polynomial? Will the observation polynomial y(z) ¼ z8 þ z5 þ z þ 1 be declared erroneous or not? What about the polynomial y(z) ¼ z8 þ z4 þ z þ 1? 9.13. The generator polynomials of a convolutional code are g1 (z) ¼ 1, g2 (z) ¼ 1 þ z. What are its rate and constraint length? Sketch the encoder scheme, draw the trellis diagram and find the free distance of the code. 9.14. The generator polynomials of a convolutional code are g1 (z) ¼ 1 þ z þ z2 , g2 (z) ¼ 1 þ z þ z2 , g3 (z) ¼ 1 þ z2 . What are its rate and constraint length? Sketch the encoder scheme, draw the trellis diagram and find the free distance of the code. 9.15. One of two generator polynomials of the convolutional code is g1 (z) ¼ 1 þ z þ z2 . Which of the polynomials g2 (z) ¼ 1, g2 (z) ¼ 1 þ z or g2 (z) ¼ 1 þ z2 is better as the second generator polynomial to maximize the asymptotic coding gain? What is this maximal gain? What sort of implication follows from this problem about comparison of systematic and non-systematic codes? 9.16. Generator polynomials of the convolutional code are g1 (z) ¼ 1 þ z þ z2 , g2 (z) ¼ 1 þ z3 . Encode the bit stream 110110110110110 . . . and explain why this code enters the class of so-called catastrophic codes, which are not recommended for practical use. 9.17. Decode as many data bits as possible if the observation is 100101100011000 and the generator polynomials of the convolutional code are g1 (z) ¼ 1, g2 (z) ¼ 1 þ z and g3 (z) ¼ 1 þ z. 9.18. Decode the observation 111111100000001111, if generator polynomials of the convolutional code are as in Problem 9.14 and it is known that after encoding four data bits the encoder is forced to a zero state by tail bits. How far is the

304

Spread Spectrum and CDMA

decoded word from the observation? If the decoding result is true, how many errors did the decoder correct? 9.19. Revise the decoding procedure of Example 9.3.4, storing all paths entering a node with equal metrics as survivors. Continue after the seventh step up to the first step where decoded data bits may be released. At what step does it occur? How many bits are released? 9.20. The bit stream is encoded by a binary convolutional code with generator polynomials g1 (z) ¼ 1, g2 (z) ¼ 1 þ z. Binary symbols are transmitted by BPSK (0 ! þ1, 1 ! 1). The communication channel is Gaussian and output observation samples are y ¼ ( 0:5, 0:5, 3, 4, 6, 2, 4, 5, 3, 2). Decode this observation using the hard and soft (based on correlation of the observation with trellis diagram paths) Viterbi algorithm. Assume that the last two code symbols correspond to a tail bit setting the encoder to zero. Explain the difference (if any) of the results of the two procedures. Which of them is more trustworthy? 9.21. Someone wants to build a turbo code starting with the convolutional code described by the generator polynomials g1 (z) ¼ 1 þ z3 þ z4 and g2 (z) ¼ 1 þ z þ z2 þ z4 . Sketch a component encoder of the turbo code.

Matlab-based problems 9.22. Write and run a program to calculate sum, product, quotient and remainder for two arbitrary binary polynomials. 9.23. Write a program that finds a generator polynomial for binary CRC of given length detecting up to three errors. 9.24. Write a program illustrating error detecting by CRC. Recommended steps: (a) Using the program of Problem 9.23, find an appropriate generator polynomial g(z) for CRC of a given length n detecting up to three errors. (b) Take any binary error vector of length n and weight 1, 2 or 3 and divide it by the generator polynomial; make sure that for any such vector but zero the syndrome is non-zero. (c) Take any decimal number smaller than 2n r , where r ¼ deg g(z), and convert it into a binary vector (the function ‘de2bi’ is a good aid for this); multiply the corresponding polynomial by the generator polynomial. (d) Using the polynomial of the previous item as the error one, check that this error pattern coinciding with some codeword cannot be detected. (e) Run the program 1000–10 000 times for CRC of length n ¼ 40 200 with independent random error vectors and calculate syndromes. How often do undetected errors happen? Compare the result with the theoretical prediction. 9.25. Write a program running convolutional encoding, given the set of generator polynomials. In Matlab, as is customary, generator polynomials are given in an octal notation. The binary vector of length vc of polynomial coefficients in a power-ascending order is appended if necessary by left zeros to make the length a multiple of three. Then every binary triple is put as an octal figure, the rightmost

Channel coding in spread spectrum systems

305

bit being the least significant, and the set of n polynomials in octal notation is presented as an n-tuple. For instance polynomials g1 (z) ¼ 1 þ z and g2 (z) ¼ 1 þ z þ z2 have octal notation (6,7). Run the program for codes with polynomials (7,5), (15,17), (53,75), (561,753), (5,7,7), (25,33,37) and (133,145,175) trying to get a non-zero codeword of minimum weight. What is the trend in the behaviour of free distance versus constraint length and rate? 9.26. Develop the program of Problem 9.25 to find the free distance of a convolutional code. Run the program for codes with polynomials (7,5), (15,17), (23,35), (53,75), (133,171), (247,371), (561,753), (1167,1545), (5,7,7), (13,15,17), (25,33,37), (47,53,75), (133,145,175), (225,331,367), (557,663,711) and (1117,1365,1633). 9.27. Using operators of the Matlab Communication Toolbox, write a program for convolutional hard-decision decoding. Assuming that the transmitted message is 10 c zeros, run the program for the code with generator polynomials (23,35). Enter the error vectors of weight 2–3 and make sure that errors are corrected whenever the parameter ‘tblen’ is around (4 5) c . Try to find the error of weight 4 which is not corrected, and explain why it may not be easy despite the free distance of the code being 7. Increasing the error weight, observe the decoder behaviour. Run the program 1000 times for independent random error patterns of a given weight and calculate bit error probability depending on error weight. Do the same for the codes (47,53,75) and (133,145,175) (free distances 13 and 15, respectively).

10 Some advancements in spread spectrum systems development

10.1 Multiuser reception and suppressing MAI In Section 4.1 we met two options for making decisions on the data in a K-user CDMA system. One of them runs the optimal (ML) procedure realized by the so-called multiuser receiver, while the other involves a single-user or conventional procedure. The conventional receiver treats MAI as no more than an additional random noise, fully ignoring the deterministic nature of signatures and correlations between them. On the other hand, multiuser algorithms utilize a priori knowledge about signature codes or, at least, their ensemble correlation properties. In this section we are going to discuss briefly the ideas underlying multiuser reception, starting with the simplest case of synchronous CDMA.

10.1.1 Optimal (ML) multiuser rule for synchronous CDMA In order to make the discussion free of secondary details let us consider the plainest, yet general enough, model of K-user DS CDMA involving real signatures and BPSK data transmission. The model covers, among others, any system with BPSK signature and data modulation. As in Section 7.2, within this subsection we consider a fully synchronous case when both chips and borders of data symbols (bits) of all users are strictly aligned in time. This, along with the assumption of the independence of consecutive data bits of any user, permits limiting the observation interval to a single bit duration: T ¼ Tb . Then the group signal of K users: sðt;bÞ ¼

Spread Spectrum and CDMA: Principles and Applications Ó 2005 John Wiley & Sons, Ltd

K X k¼1

Ak bk sk ðtÞ

Valery P. Ipatov

ð10:1Þ

308

Spread Spectrum and CDMA

where, similarly to (4.1), Ak > 0 is the real amplitude of the kth user signal, b ¼ (b1 , b2 , . . . , bK ) is the vector of data bits of K users (bit pattern) and sk (t) is the kth user’s signature. As was mentioned in Section 4.1, the globally optimal (ML) procedure involves searching the estimate ^ b ¼ (b^1 , b^2 , . . . , b^K ) of the K user data bits pattern b as the value of b minimizing the Euclidean distance (or its square d 2 (s, y)) between the observation y(t) and group signal (10.1). Calculating d 2 (s, y) in the same way as in (4.3) results in: d 2 ðs; yÞ ¼

ZT

½ yðtÞ

sðt; bފ2 dt ¼ kyk2 2

0

K X k¼1

Ak bk zk þ

K X K X

Ak Al bk bl kl

k¼1 l¼1

ð10:2Þ

where zk ¼

ZT

yðtÞsk ðtÞ dt

ð10:3Þ

0

is, as usual, correlation of the observation y(t) with the kth signature, kl is the correlation coefficient of the kth and lth signatures, and the presence of amplitudes Ak allows use of a convenient normalization of signatures: 2

Ek ¼ ksk k ¼

ZT

s2k ðtÞ dt ¼ 1; k ¼ 1; 2; . . . K

0

Let us introduce two matrices: G ¼ diag(A1 , A2 , . . . , AK ), a diagonal K  K matrix of users’ amplitudes, and C ¼ [kl ], k, l ¼ 1, 2, . . . , K, the correlation matrix of signatures. With designation z ¼ (z1 , z2 , . . . , zK ) for the vector of correlations (10.3), the squared distance (10.2) becomes (superscript T symbolizing vector–matrix transpose): d 2 ðs; yÞ ¼ kyk2 2bGzT þ bGCGbT

ð10:4Þ

The first term in the right-hand side of (10.4) is fixed with a current observation y(t) and consequently the ML estimate ^ b may be found as the value of b maximizing the difference of two other terms: bGz 2^

T

T ^ b ¼ maxð2bGzT bGCG^ b

bGCGbT Þ

ð10:5Þ

When a CDMA system is not oversaturated (K  N; see Section 7.2), all signatures are allowed to be orthogonal, so P that 2kl ¼ kl and C ¼ IK , where IK is the Kth order identity matrix. Then bGCGbT ¼ K k¼1 Ak does not depend on the user’s bit pattern b. As was noted in Section 4.1, multiuser detecting then degenerates into a conventional one, where the sign of the correlation zk defines the estimate b^k of the kth user’s bit bk . In the case of non-orthogonal signatures (e.g. oversaturated CDMA, K > N) the conventional receiver yields to the ML one, but the latter may appear prohibitively complex. Indeed, the data vector b is strictly restrained by the BPSK alphabet limitation bk ¼ 1, and no

309

Spread spectrum systems development

procedure exists that is more computationally efficient than just trying all 2K possible bit patterns and comparing the results of their substitution to the right-hand side of (10.5). Therefore, ML multiuser detection according to (10.5) has exponential complexity versus the number of users (see numerical example in Section 4.1). On the other hand, the motivation to involve multiuser detection is often strongest when the number of users is so great that conventional detection fails due to the high level of MAI. This explains the interest in various quasi-optimal multiuser algorithms, some of which are surveyed in the rest of the section.

10.1.2 Decorrelating algorithm Let us start with a conventional (i.e. correlation-based) receiver of user number one’s data. According to (10.1) the observation: yðtÞ ¼ sðt; bÞ þ nðtÞ ¼

K X k¼1

Ak bk sk ðtÞ þ nðtÞ

ð10:6Þ

This, after substitution to (10.3), where k ¼ 1, leads to: z 1 ¼ A 1 b1 þ

K X k¼2

Ak bk k1 þ n1

ð10:7Þ

RT where n1 ¼ 0 n(t)s1 (t) dt is a noise sample at the first correlator output. The second term of (10.7) is MAI, and the question is whether it may be suppressed to zero by means of some linear transform of the input observation. Whatever this linear operation is, finally we should have some MAI-free substitute &1 of z1 , i.e. the scalar, producing the decision on the first user’s current bit as: b^1 ¼ signð&1 Þ

ð10:8Þ

Any linear operation transforming y(t) into a scalar may be described as correlation:

&1 ¼

ZT

yðtÞuðtÞ dt

ð10:9Þ

0

differing from (10.3) by only a reference signal u(t). Therefore, we are going to suppress MAI declining matched reference s1 (t) in favour of mismatched one u(t), i.e. at the cost of loss in SNR with respect to a thermal noise. We have already resorted to this trick when seeking zero-forcing filters to remove autocorrelation sidelobes (see Section 6.12). Using (10.6) in (10.9) replaces (10.7) by: &1 ¼ A1 b1 1u þ

K X k¼2

Ak bk ku þ n01

ð10:10Þ

310

Spread Spectrum and CDMA

where ku is the correlation coefficient of the kth signature R T with u(t), normalization of reference u(t) is the same as for signatures, and n01 ¼ 0 n(t)u(t) dt is a noise contribution in &1 . Let us put signatures and a reference signal u(t) in the form (2.50) typical of DS CDMA with real-valued signatures: sk ðtÞ ¼

N X1 i¼0

ak;i s0 ðt

iDÞ; uðtÞ ¼

N X1 i¼0

ui s0 ðt

iDÞ

ð10:11Þ

where ui , i ¼ 0, 1, . . . , N 1 is a real code sequence of the reference u(t). Using the vector notation of code sequences ak ¼ (ak, 0 , ak, 1 , . . . , ak, N 1 ), u ¼ (u0 , u1 , . . . , uN 1 ) (see Section 7.2) and setting with no lost of generality chip energy E0 ¼ 1, we come to equations kl ¼ (ak , al ) ¼ ak aTl , ku ¼ (ak , u) ¼ ak uT . To remove the MAI term in (10.10) independently of amplitudes and bits of interfering users we need to fulfil K 1 conditions: ku ¼ 0, k  2. In other words, the reference code u should be a solution of the linear equation set ak uT ¼ uaTk ¼ 0, k ¼ 2, 3, . . . K. Preserving the non-zero useful effect 1u has to be non-zero, hence u is just a properly scaled solution v of the equation: vA ¼ e1

ð10:12Þ

where columns of the N  K signature matrix A are signature code vectors: A ¼ (aT1 , aT2 , . . . , aTK ) and e1 is a K-dimensional vector of the view e1 ¼ (1, 0, 0, . . . , 0). When all signature vectors are linearly independent, the system (10.12) may have a set of solutions, but among all vectors v satisfying (10.12) we choose the one that is a linear combination of signatures, i.e. rows of AT : v ¼ xAT , where x is an unknown K-dimensional row vector. The reason for such a choice is that inclusion in v of any component orthogonal to the space of the signature vectors will only increase the norm of v, i.e. the noise component at the correlator output, with no increase of the useful first term in (10.10). With this substitution (10.12) becomes: xAT A ¼ xC ¼ e1 Linear independence of signatures (columns of A) means rank K of the correlation K  K matrix C ¼ AT A, i.e. its invertibility and uniqueness of solution of the equation above: x ¼ e1 C 1 . Then: v ¼ xAT ¼ e1 C 1 AT ¼ e1 ðAT AÞ 1 AT

ð10:13Þ

is a desired solution of (10.12), whose scaling u ¼ v/kvk results in the normalized decorrelation reference u, so that uaT1 ¼ 1u . This normalization is practically unnecessary, having no effect on the sign of &1 in the decision rule (10.8). Physically the reference vector (10.13) is just orthogonal to all signatures but the first, entirely eliminating MAI at the output of a correlator tuned to the first user’s signal. We would find the reference signal for the kth user’s receiver in the same way, replacing e1 in (10.13) by ek , whose unique non-zero component is the kth one. The main drawback of the described decorrelating receiver is its working capacity with only linearly independent signatures. If this demand is not observed, any attempt to

311

Spread spectrum systems development

force MAI to zero will inevitably make a useful effect (the first term) in (10.10) vanish too. At the same time, linear independence means that K  N, in which case the most adequate choice of signatures is an orthogonal set (see previous subsection) entailing optimality of a single-user receiver and automatically rejecting MAI with no SNR loss and no special decorrelation processing. In the case of oversaturation (K > N) linear independence of signatures is impossible and the decorrelating algorithm cannot be used.

10.1.3 Minimum mean-square error detection Let us again exploit the idea of mismatched processing in a correlator tuned to the first user’s signal, but this time, instead of forcing MAI to zero, we will try to minimize the overall corrupting effect of MAI and noise. Coming back to (10.7), we may note that only the term A1 b1 in it is a useful component, the other two presenting an overall interference (MAI plus noise). In this light it is natural to look for a linear operation (10.9), imitating a useful contribution with minimum mean-square error (MMSE). To formalize the problem we first rewrite (10.9) in a vector form, substituting u(t) from (10.11): &1 ¼

N X1 i¼0

ui yi ¼ u~yT

ð10:14Þ

RT where ~ y ¼ (y0 , y1 , . . . , yN 1 ) and yi ¼ 0 y(t)s0 (t iD) dt, i ¼ 0, 1, . . . , N 1. Technically yi may be obtained as a sample at the output of a chip matched filter taken at the appropriate moment (see (2.68)), allowing to look at ~y as a vector of observations after the chip matched filtering. Our task now is to minimize mean square deviation "2 of &1 from A1 b1 by an appropriate choice of a reference code vector u: " 2 ¼ j A 1 b1

 & 1 j 2 ¼  A 1 b1

2 u~yT  ¼ min u

Note that no a priori normalization of the reference u is necessary. After squaring and term-wise averaging, the mean-square error takes the form: "2 ¼ ðA1 b1 Þ2

yT b1 þ ðu~ 2A1 u~ yT Þ2 ¼ ðA1 b1 Þ2

2A1 u~yT b1 þ u~yT ~yuT

ð10:15Þ

where we use elementary matrix algebra (commutativity of multiplication by a scalar and associativity of vector–matrix multiplication, commutativity of a scalar product yuT ) and non-randomness of u. The ith component of ~y after substitution of u~ yT ¼ ~ (10.6) and then (10.11) becomes: yi ¼

ZT

yðtÞs0 ðt

iDÞ dt ¼

0

¼

K X k¼1

ZT "X K 0

Ak bk

N X1 j¼0

ak; j

ZT 0

s0 ðt

k¼1

#

Ak bk sk ðtÞ þ nðtÞ s0 ðt

jDÞs0 ðt

iDÞ dt þ i ¼

K X k¼1

iDÞ dt

Ak bk ak;i þ i

ð10:16Þ

312

Spread Spectrum and CDMA

RT where i ¼ 0 n(t)s0 (t iD) dt is the ith noise sample at the chip matched filter output and a natural assumption is used that the chips time-spaced by a non-zero integer number of repetition periods D are orthogonal (e.g. if chip duration is no longer than D, those chips do not overlap). Now we see that yi b1 ¼ A1 a1, i , because bits of different users are independent of each other (bk bl ¼ kl ) and of noise ( i bk ¼ i  bk ¼ 0), and hence: A1 ~ yT b1 ¼ A21 aT1

ð10:17Þ

~, whose elements are simply correlation ~T y In a similar manner we calculate the matrix y moments yi yj of samples yi . Then, according to (10.16) and allowing for non-correlatedness of noise samples after the chip matched filter: yi yj ¼

K K X X k¼1 l¼1

Ak Al bk bl ak;i al;j þ i j ¼

K X k¼1

A2k ak;i ak;j þ 2 ij

2 being the variance of a noise component of yi . Thus, the N  N correlation matrix R of the observation vector ~ y is: R¼~ yT y ¼ ½yi yj Š ¼ AG2 AT þ 2 IN

ð10:18Þ

where IN is the Nth order identity matrix. Substituting (10.17) in (10.15) after discarding the first term independent of u gives the following scalar function to minimize by adjusting u: f ðuÞ ¼ uRuT

2A21 a1 uT

ð10:19Þ

At the point u of extremum of f (u) the gradient of f (u), i.e. vector, whose components are derivatives of f (u) with respect to every component of the vector u, should be a zero vector. The gradient of f (u) is readily found (see Problem 10.3) as 2(uR A21 a1 ). Thus, with invertible matrix R the vector u delivering an extremum to f (u) is defined by the equation: u ¼ A21 a1 R

1

ð10:20Þ

where R is given by (10.18). The reader is challenged to check that the extremum just found is really a minimum of (10.19) (Problem 10.3). Clearly, this algorithm does not rest on the invertibility of the signature correlation matrix C ¼ AT A; just the observation correlation matrix (10.18) should be invertible, which is practically always true. Hence, the solution (10.20), in contrast to (10.13), is universal regardless of the relation between K and N. At the same time, at least in one important particular case the solution (10.20) degenerates to the single-user algorithm. Let the signature set be a Welch-bound one, meaning that the rows of the signature matrix A are orthogonal (see Section 7.2.2), i.e. AAT ¼ IN . If all signals have the same intensity A, G2 ¼ A2 IK , and the observation correlation matrix (10.18) becomes the simplest, R ¼ (A2 þ 2 )IN , resulting in u ¼ [A2 /(A2 þ 2 )]a1 , which reproduces a scaled first signature, i.e. the reference of a conventional receiver. Thus, no special MMSE processing exists for the Welch-bound signatures of equal power. This fact is rather trivial if K  N, since then such signatures are orthogonal and a conventional receiver

313

Spread spectrum systems development

eliminates MAI fully with best noise filtering, but for the oversaturation scenario (K > N) the statement is not that predictable. In the literature the result (10.20) is often given in another form including explicitly the signature correlation matrix C ¼ AT A [99–101]. Deriving it is possible, for instance, through the matrix inversion lemma given here in the form fitted to the context: R

1

¼ ðAG2 AT þ 2 IN Þ

1

¼

1 IN 2

1 AðAT A þ 2 G 2 Þ 1 AT 2

ð10:21Þ

Proof of this result consists in a direct check (Problem 10.4). Note that it works whenever the matrix G is invertible, which is observed automatically if all users’ amplitudes are nonzero. Making use of (10.21) and equation A21 a1 ¼ e1 G2 AT in (10.20) results in: h i 1 u ¼ e1 G2 AT R 1 ¼ 2 e1 G2 AT AT AðAT A þ 2 G 2 Þ 1 AT  h i 1 ¼ 2 e1 G2 AT ðAT A þ 2 G 2 ÞðAT A þ 2 G 2 Þ 1 AT þ e1 ðAT A þ 2 G 2 Þ 1 AT 

and eventually:

u ¼ e1 ðC þ 2 G 2 Þ 1 AT

ð10:22Þ

Returning back to (10.14), we write the final form of the decision rule on the first user’s bit as: b1 ¼ signð&1 Þ ¼ sign½e1 ðC þ 2 G 2 Þ 1 AT ~yT Š

ð10:23Þ

Spreading this rule to the receiver of the kth user’s data is again immediate: ek has to replace e1 . Emphasizing again that the rule under study is universal independently of signature correlation matrix invertibility, it is nevertheless noteworthy that if C is non-singular (K  N is a necessary condition of it) and thermal noise diminishes, the MMSE detector converges asymptotically to the decorrelating one: u ¼ e1 ðC þ 2 G 2 Þ 1 AT ! e1 C 1 AT : 2 !0

To demonstrate the efficiency of MMSE it is appropriate to compare the signalto-interference-plus-noise ratio (SINR) for the receiver effect &1 in cases of reference (10.22) and that of a conventional receiver u ¼ a1 . The contribution of the kth signal in &1 as seen from (10.14) is Ak uaTk , so P that the useful power (created by the first useful T 2 2 signal) is A21 (uaT1 )2 and MAI power is K k¼2 Ak (uak ) . Uncorrelatedness of noise samples i after a chip matched filter means that their powers are added afterP weighting by ui in N 1 2 (10.14), so that the total power of the noise component of &1 is 2 i¼0 ui ¼  2 kuk2 . Combining these results produces SINR:  2  2 A21 uaT1 q21b uaT1 2 qI ¼ K ¼ K ð10:24Þ P 2  T 2 2 P 2  T 2 2 2 Ak uak þ kuk qkb uak þkuk k¼2

k¼2

where q2kb ¼ A2k /2 is power SNR per data bit for the kth user.

314

Spread Spectrum and CDMA

Example 10.1.1. Consider an oversaturated synchronous CDMA with Welch-bound signatures. Binary Welch-bound ensembles exist for any K > N allowing the existence of a K  K Hadamard matrix. The signatures then are just K columns of this matrix after discarding any K N rows. In the light of the aforesaid, the case of equal powers will not display any advantages of MMSE against conventional detection. For the values K ¼ 64, N ¼ 48 a random pattern of users’ amplitudes was taken as 64 samples of Rayleigh variable to imitate the Rayleigh channel. Figure 10.1 presents the dependence of SINR (10.24) for MMSE and conventional detectors on bit SNR under some ‘benign’ (wellscattered) amplitude pattern. The curves show that the gain of MMSE sometimes appears significant (in Figure 10.1 up to about 10 dB). Still, it should be remembered that such a profit is just a matter of chance: for some amplitude patterns it may appear even bigger, but the more uniform the amplitude pattern, the smaller is the difference in SINR versus the conventional receiver. One more remark is that the MMSE detector has much better resistance to the scatter of users’ intensities (if signatures are non-orthogonal, of course) in comparison with the conventional receiver, making it especially attractive wherever the power control is not perfect.

15

10 MMSE Conv. K = 64, N = 48 SINR (dB)

5

0

–5

–10

Figure 10.1

–5

0

5 10 15 1st user bit SNR (dB)

20

25

Example SINR curves for MMSE and single-user receivers

10.1.4 Blind MMSE detector Although the computational complexity of the MMSE algorithm (as well as the decorrelating one) is not at all practically prohibitive there is still one implementation issue motivating further research. As (10.20) shows, the key operation of the MMSE algorithm is inversion of the observation correlation matrix R defined by (10.18). To perform it the receiver of the kth user should know, along with its own signature, also

315

Spread spectrum systems development

the signatures of all the other users. In some situations such a requirement looks fairly excessive. One of the most typical involvements of synchronous CDMA is the downlink of mobile radio, and making every mobile know all the signatures currently utilized by the other users would complicate the system dramatically. Fortunately, the correlation matrix of the observed process may be estimated experimentally from the observation itself, provided the observation period is long enough. This is the core idea of blind multiuser algorithms. Suppose that ~ yi is an N-dimensional row vector of samples at the chip matched filter output corresponding to the data bit number i ¼ 0, 1, . . .. ^ i of the observation correlation matrix may be found as: Then estimate R ^i ¼ R

i i 1 1 X i 1X 1 T i ^ ~yi ~yi ¼ ~ ~  Ri yt ¼ yt þ yTt ~ yTt ~ i þ 1 t¼0 i þ 1 i t¼0 iþ1 iþ1

1

þ

1 T ~y ~y iþ1 i i

^ i in a recurrent way: as soon as the portion of Therefore, it is possible to compute R ^ i. observation samples spanning the new bit arrives, it is used to update the estimate R After this the result is substituted in (10.20) to find the current reference as ^ 1 , calculating from (10.14) &1 ¼ ui ~ ui ¼ A21 a1 R yTi , and the decision on the ith bit accordi ing to (10.23). Variations and advancements of blind multiuser algorithms are plentiful and may be found in the literature (see [19,100,101] and their bibliographies).

10.1.5 Interference cancellation One can construe the low-complexity of both decorrelating and MMSE detectors by the fact that they exploit a single-user philosophy, i.e. a linear operation of multiplying the observation vector ~ y by a mismatched reference vector u. The interference cancellation strategy is again based on a conventional receiver, supplemented by a loop of subtraction of MAI terms from the output effect (10.7). Suppose that the first user receiver knows the signatures and amplitudes of all users and one way or another has obtained estimates b^2 , b^3 , . . . , b^K of data bits of the side users. Then one is capable of regenerating all side user signals, subtracting their sum from the observation y(t) and utilizing the result as an input (presumably free of MAI) to the conventional receiver. Certainly, the efficiency of such a detector will dramatically depend on the reliability of knowledge of side signal amplitudes and the accuracy of estimates of side user bits. Among others, the multistage procedure is widely discussed in the literature [19,102]. Its first stage involves successive estimates of user bits transferring from the stronger to weaker signals, and using the already estimated k 1 user bits to remove corresponding MAI terms when estimating the kth user’s bit. After all K bits are estimated by so doing the procedure runs the next stage, where all the same operations are repeated. This time, however, the receiver’s knowledge on MAI is richer compared to the previous stage, and subtraction of the recreated MAI starts from the very beginning, i.e. estimating a bit of the strongest user. Stages like this are iterated as many times as is wished, each starting with an updated MAI recreation and continuing to refine it during the course of user bit pattern estimation. When one or another terminating criterion is met, the procedure outputs the final estimate of the bit of the user of interest.

316

Spread Spectrum and CDMA

10.1.6 Asynchronous multiuser detectors Although the multiuser detection algorithms briefly discussed above are tailored to synchronous CDMA, they are, after an appropriate modification, extendable to the asynchronous case, too. Let us come back to (10.6) and adapt it to the asynchronous situation illustrated by Figure 7.15, assuming alignment of chip boundaries of all users and operating with only baseband real signatures (i.e. ignoring mutual phase shifts of bandpass signatures). Assume also that all signatures are periodic with period equal to bit duration T ¼ Tb and consider as before the first user receiver ( 1 ¼ 0) at the observation interval of data bit number zero. Then: 8 K X > > > b s ðtÞ þ Ak bk; 1 sk ðt k Þ þ nðtÞ; 0 < t  1 A > 1 1;0 1 < k¼2 yðtÞ ¼ ð10:25Þ K > X > > > Ak bk;0 sk ðt k Þ þ nðtÞ; 1 < t  T : A1 b1;0 s1 ðtÞ þ k¼2

As (10.25) shows, the character of MAI created by the kth user depends now on whether the kth user’s data bit changes or not during the observation interval, the kth signature altering its polarity at the moment t ¼ k in the second case. Suppose that the first user receiver knows the timings k of all users. In this case the number of potentially harmful MAI vectors created by K 1 side users is 2(K 1), unlike the synchronous case, where a similar number was only K 1. Together with the first signature vector we have 2K 1 vectors in total. If they are all linearly independent, a modified version of the decorrelating algorithm (10.13) may be used to eliminate MAI entirely regardless of the bits transmitted by users. Clearly, within the dimension (spreading factor) N, the maximal number of users K allowing such a processing is limited to 2K 1  N, i.e. cannot be greater than dN/2e. The necessary alteration of (10.13) is replacement of the ‘pure’ N  K signature matrix A by an extended N  (2K 1) one, whose columns are the first signature, K 1 properly time-shifted other signatures and the latter with polarity hops, starting at chip number zero (see Figure 7.15). The MMSE detector interprets MAI statistically, i.e. as a random process described by its correlation matrix. The same interpretation is, certainly, applicable to the asynchronous case and again some revision is necessary to allow for changing the observation correlation matrix [19]. Since in an asynchronous system every side user bit may cover two consecutive bits of the user of interest, MAI correlation extends beyond the duration of one bit. That is the reason why the performance of asynchronous multiuser detectors typically improves when the observation interval spans several data bits. We cannot go deeper into discussing multiuser detecting due to space limitations. This area is among the most challenging and rapidly advancing currently, and readers eager to get better insight into its current state as well as to learn about the prospects of its application in 3G and beyond are recommended to consult [19,100,102–104] and their references.

10.2 Multicarrier modulation and OFDM In recent years the transmission mode called multicarrier (MC) modulation has gained great popularity in telecommunications. In general terms, MC modulation means no

317

Spread spectrum systems development

more than involving a multitude of parallel subcarriers to transmit symbols of the same datastream. The specific form of utilizing the subcarriers may vary depending on the goal pursued. In our context the issue of primary interest is the relation of MC modulation with the spread spectrum concept. It follows from the previous contents that all advantages inherent to spread spectrum have their origin in a high time–frequency product (processing gain, spreading factor) WT. Various ways exist to widen the signal spectrum, given the duration given. DS spread spectrum solves this task, replacing conventional ‘slow’ symbol pulses by ‘fast’ signals of some convenient shape, i.e. controlling signal bandwidth via the time domain. MC modulation from this angle may be referred to as an alternative method of spreading the spectrum through its direct shaping in the frequency domain.

10.2.1 Multicarrier DS CDMA The simplest version of incorporating the MC technique into CDMA is an ordinary frequency multiplexing of data of the same user. To realize it Mc subcarriers transmit demultiplexed and DS spread data with non-overlapping spectra of subcarrier signals. Figure 10.2 explains this transmission mode, which is called multicarrier DS CDMA Source (fast) bit stream

DS signature

Demultiplexing of source bit stream

t Tb 1st slow bit stream

t

Tp′

∆′

1st subcarrier spread symbol t

t

2nd subcarrier spread symbol

2nd slow bit stream

t

t Mcth subcarrier spread symbol

Mcth slow bit stream

Tb′ = McTb

t

t

f1

fMc

f2

W′

F W MC signal power spectrum

Figure 10.2 Explanation of MC-DS-CDMA

f

318

Spread Spectrum and CDMA

(MC-DS-CDMA). The source ‘fast’ bit stream of rate R ¼ 1/Tb is demultiplexed (split) into Mc parallel ‘slow’ bit streams of rate R/Mc (or bit duration T 0b ¼ Mc Tb ) each. The ith slow bit stream is transmitted on its specific subcarrier of frequency fi , i ¼ 1, 2, . . . , Mc using DS spreading and some data modulation mode (BPSK, QPSK or other mode). With spreading chip duration D0 and subcarrier data symbol duration T 0p the bandwidth and spreading factor of one subcarrier signal are found as W 0  1/D0 and N 0 ¼ T 0p /D0  W 0 T 0p , respectively. Spacing F of the subcarrier frequencies should exclude spectra overlapping, i.e. meet the restriction F ¼ W 0 þ Fg , where Fg is a guard interval allowing for out-of-band spectra sidelobes. Therefore the total bandwidth occupied by the system: W ¼ ðMc

1ÞF þ W 0 ¼ Mc W 0 þ ðMc

1ÞFg :

ð10:26Þ

The receiver of MC-DS-CDMA consists of Mc parallel identical receivers, each tuned on its own subcarrier and processing it independently of the others. Demodulated slow bit streams from their outputs are then multiplexed to restore the transmitted source fast bit stream. Comparison of this system with DS CDMA of the same total bandwidth W and data rate R shows that due to the necessity for guard intervals MC-DS-CDMA yields to DS-CDMA in spreading factor. If both systems use the same modulation mode then symbol duration Tp for DS CDMA should be Mc times shorter than the MC-DS-CDMA symbol duration T 0p , but chip duration in DS CDMA may be taken as D  1/W providing the spreading factor N ¼ Tp /D  WT 0p /Mc . In accordance with (10.26) the ratio of this entity to the spreading factor of MC-DS-CDMA: N Mc 1 F g ðMc 1ÞFg ¼1þ  0 ¼1þ W W ðMc 1ÞFg N0 Mc

ð10:27Þ

may remarkably exceed one. Since the spreading factor is the most important parameter of CDMA, determining user capacity, jamming immunity etc., MC-DS-CDMA proves to be not the best potential option for utilization of the available spectral resource. Sometimes, however, other factors may prevail, as takes place in the specification of cdma2000, which recommends MC-DS-CDMA for arranging a downlink on the grounds of backward compatibility with cdmaOne. In this case the single-carrier format of cdmaOne (slightly modified) is just replicated on three appropriately spaced carriers.

10.2.2 Conventional MC transmission and OFDM Let us digress for a while from spread spectrum and CDMA to get a better understanding of the reasons underlying the considerable interest in the MC technique in modern wireless telecommunication. Suppose one wants to transmit a source bit stream using some conventional (non-spread-spectrum) modulation mode (BPSK, QPSK etc.). With M-ary modulation and necessary data transmission rate R, the duration of the data symbol pulse is Tp ¼ ( log2 M)/R. Suppose that the channel coherence bandwidth Bc (see Section 3.6) is significantly narrower than the bandwidth of data symbols (Bc  W  1/Tp ¼ R/ log2 M), or, putting it differently, the delay spread ds exceeds symbol duration remarkably. Then under the ‘direct’ transmission (see Figure 10.3a),

319

Spread spectrum systems development

Single carrier power spectrum Source (fast) bitstream

(a) t W ≈ 1/Tp =

1st slow bit stream t

f

f0

Tb

R log2 M

Subchannel power spectra

2nd slow bit stream

(b) t f1

Mcth slow bit stream

f2

fMc

F=W′ Tb′ = McTb

f W′ ≈

t

1 Tp′

Overall MC spectrum f W = McW′ =

R log2 M

Figure 10.3 Single-carrier (a) and MC (b) data transmission

a deep ISI (see Section 3.5.4) will be present, distorting the data symbols following the current one. To counter it the receiver will have to involve a rather complex equalizer with a long memory, typically realized as an adaptive FIR filter, i.e. tapped delay-line with adjustable tap weights. MC transmission offers an alternative solution (Figure 10.3b) avoiding the need for complex equalizing. Let us again demultiplex the ‘fast’ source bit stream of rate R to Mc  W/Bc parallel ‘slow’ bit streams having rate R/Mc each. Certainly, the overall rate provided by all slow bit streams is equal to the original one, i.e. R. Now let us take Mc subcarriers f1 , f2 , . . . , fMc spaced uniformly with interval F ¼ W 0 ¼ W/Mc and use each of them to transmit one of Mc slow bit streams in the same modulation mode as before. Every individual subcarrier forms a separate subchannel operating regardless of the others and transmitting a slow bit stream by longer pulses (symbols) of duration Tp0 ¼ Mc Tp , i.e. occupying Mc times narrower bandwidth W 0 ¼ W/Mc than before. This means that within a subchannel the fading is no longer frequency-selective, since W 0 ¼ W/Mc  Bc . For a flat fading the delay spread does not go far beyond a single pulse, and ISI is less dramatic than it was initially and may be countered by comparatively simple equalizers. The total bandwidth occupied by the MC system is around W  Mc /T 0p ¼ 1/Tp ¼ R/ log2 M, i.e. equalling that of the single-carrier transmission. In fact, spectral efficiency of the MC system appears to be even better, since the shape of its real spectrum is closer to a rectangle.

320

Spread Spectrum and CDMA

We do not use any frequency guard intervals now, and, moreover, allow subchannel spectra to overlap, since a traditional estimate of subchannel bandwidth W 0  1/T 0p usually leaves remarkable out-of-band spectrum sidelobes. Nevertheless, the mutual interference between subchannels may be entirely suppressed. Suppose that the symbol pulse is rectangular and by agreement its bandwidth is measured as W 0 ¼ 1/T 0p . Then frequency spacing between adjacent subcarriers F ¼ W 0 ¼ 1/T 0p guarantees the orthogonality of subchannel signals, i.e. complete elimination of mutual interference between the MC subchannels. That is why this version of the MC modulation technique bears the name orthogonal frequency division multiplexing (OFDM). Let the modulation symbols (complex amplitudes) of Mc subcarriers of OFDM be bi ¼ Ai exp (ji ), i ¼ 1, 2, . . . , Mc , where Ai and i are real amplitude and phase, respectively, and symbols are transmitted by rectangular pulses. Then the resulting signal in complex notation, which is physically a complex envelope to be up-converted further to some central carrier f0 , is: " # Mc Mc X X j2ði 1Þt S_ ðtÞ ¼ bi exp bi expðj2fi tÞ ¼ ð10:28Þ Tp0 i¼1 i¼1 where f1 is set equal to zero, and therefore fi ¼ (i 1)F ¼ (i 1)/T 0p . The latter assumption leads to no loss of generality, since the eventual value of the central frequency is afterwards set up by an up-conversion. Signal (10.28) is OFDM symbol, the number of different OFDM symbols (OFDM alphabet size MOFDM ) being determined by the size of the alphabet of modulation symbols M and the number of frequencies: MOFDM ¼ M Mc . For the example of BPSK OFDM MOFDM ¼ 2Mc . Sampling (10.28) with interval Ts ¼ T 0p /Mc produces the sequence: S_ l ¼ S_ ðlT 0p =Mc Þ ¼

Mc X i¼1

bi exp



 j2ði 1Þl ; l ¼ 0; 1; . . . ; Mc Mc

1

ð10:29Þ

Fast stream

Demultiplexer

replicating (except for an immaterial constant coefficient) the inverse discrete Fourier transform (IDFT) of the sequence of modulation symbols fbi g. This uncovers the key reason for the popularity of OFDM: to implement this MC mode there is no need to modulate parallel generators of Mc subcarriers and sum the results. The same output effect is obtained with the aid of IDFT of modulation symbols. Thus, the typical structure of an OFDM transmitter (Figure 10.4) includes demultiplexer, and an IDFT unit outputting the IDFT vector (10.29), which is then converted from parallel to serial form of sequential samples and interpolated to produce a continuous OFDM symbol

Slow streams IDFT

Parallel to serial

OFDM symbol Interpolator

Figure 10.4 Generation of OFDM symbol

321

Spread spectrum systems development

(10.28). This latter (after introducing a prefix; see below) is up-converted and transmitted on the desired central frequency f0 . At the receiving end there is also no need to use Mc parallel receivers each tuned to its individual subcarrier, since one may extract fbi g from (10.29) by the direct discrete Fourier transform (DDFT):   M c 1 X j2ði 1Þl S_ l exp ð10:30Þ ¼ Mc bi ; i ¼ 1; 2; . . . ; Mc Mc l¼0 This shows that a DDFT unit is an appropriate device to split a received OFDM symbol into Mc subchannel effects necessary to retrieve transmitted data. Still, at the real channel output the receiver does not have at its disposal a ‘pure’ OFDM symbol. Instead it observes a complex envelope Y_ (t), containing an OFDM symbol distorted by noise and ISI. As follows from its principle, the MC technique, increasing symbol duration limits the depth of ISI propagation to the symbol following the current one. To exclude this residual ISI, too, one may insert a guard interval of duration Tg  ds between adjacent MC symbols. This interval should not compulsorily be empty. Moreover, filling it with a cyclic prefix of the OFDM symbol remarkably facilitates neutralization of the channel multipath effects. Appending a cyclic prefix serves to convert a convolution of the transmitted signal with the channel pulse response into the cyclic one, corresponding to the product of DFT images. Denote ¼ b ds /Ts c an integer number of sampling intervals in maximal channel delay and append v last samples of (10.29) as a prefix to the transmitted OFDM symbol. The receiver will drop the first samples of S_ l , l ¼ , þ 1, . . . , Mc 1, so that multipath replicas of the previous OFDM symbol will not affect Mc samples left. The delayed replicas of the current symbol itself will be influential, however, on the latter samples due to the channel multipath propagation. If the channel pulse response samples are H_ 0 , H_ 1 , . . . , H_ , then each observation sample Y_ l , l ¼ 0, 1, . . . , Mc 1 (noise neglected) is found as the convolution: Y_ l ¼

X m¼0

S_ l

_

mH m; l

¼ 0; 1; . . . ; Mc

1

ð10:31Þ

Due to the cyclic prefix the sequence S_ l m , l ¼ 0, 1, . . . , Mc 1 is a cyclic shift of the sequence S_ l for any m ¼ 0, 1, . . . , , therefore (10.31) is a cyclic convolution, and its ~_ and H ~_ of sequences S_ and H_ . DFT of the DFT spectrum is a product of DFTs S i i l l former is just a scaled sequence of modulation symbols fbi g (see (10.30)), while   j2ði 1Þl ~_ ¼ X H_ exp H i l Mc l¼0 is the channel transfer function at the frequencies fi ¼ f1 , f2 , . . . , fMc , so that: ~_ ¼ M b H ~_ Y i c i i ; i ¼ 1; 2; . . . ; Mc

ð10:32Þ

This result shows that to remove the channel influence on the OFDM signal, i.e. perform equalizing, it is enough to simply divide each sample at the output of the receiver DDFT

322

Spread Spectrum and CDMA

Dropping prefix

Serial to parallel

bˆ1 w*1

~. YMc

w*Mc

Decision unit

Sampler

. Yi

DDFT

. Y(t)

~. Y1 ~. Y2

bˆ2

bˆ Mc

Figure 10.5 OFDM receiver structure

~_ at the corresponding frequencies.1 To learn unit by the channel transfer function H i ~ _ the current channel state, i.e. H i , some special training procedures are typically used. Note also that since the guard interval creates a sort of overhead reducing the data transmission rate, it is often reasonable to increase Mc , making the guard interval a small fraction of OFDM symbol duration. When data are transmitted with PSK and subchannel signals are processed separately, i.e. the ith component of DDFT (10.32) is used independently of the others to demodulate the modulation symbol bi , the equalization above may be simplified to just compensation of the channel phase shift, since subcarrier amplitude is redundant for a decision. If joined subchannel processing is necessary, however, e.g. in the case of ~_ are of serious importance, MC-based CDMA considered below, the amplitudes of H i and the ultimate equalizing may appear preferable. Summarizing, we may present the OFDM receiver structure in the form of Figure 10.5. The sampler provides samples Y_ l , from which the prefix ones are then discarded. The sample sequence is then transformed into a parallel form. The DDFT unit outputs DFT ~_ , which are data symbols b distorted by noise and channel effects. spectral components Y i i Therefore they, after equalizing (just multiplying by an appropriate weight coefficients wi ), may serve to elaborate data symbol estimates b^i in the same manner as for BPSK, QPSK, QAM or other modulation mode.

10.2.3 Multicarrier CDMA The MC modulation scheme is easily adaptable to the multiuser environment to provide code division multiplexing. Unlike DS CDMA, where an appropriate signature shaping in the time domain provides separation of user signals, in multicarrier CDMA (MC-CDMA) signatures are formed in the frequency domain, by controlling the amplitudes and phases of subcarriers in a user-specific manner. One way of explaining MC-CDMA is linking DS CDMA with MC transmission. Let us refer back to Figure 10.3 and imagine that instead of the source fast bit stream we have the kth user data symbol

1

Such evening of the channel transfer function is known as zero-forcing equalizing and was mentioned earlier in Section 6.12.

323

Spread spectrum systems development

stream spread by the kth user DS signature of length (spreading factor) N. By this we have N DS chips of duration D per kth user data symbol of duration Tp . Let us demultiplex this fast DS spread stream into Mc ¼ N slow streams, unfolding every data symbol into Mc ¼ N parallel chips of long duration D0 ¼ Tp ¼ ND. Each of these parallel slow chip streams is further transmitted in an MC (OFDM) manner, so that each user has his specific law of modulating subcarriers. Let us describe the same more directly. Let bk be a current data symbol of the kth user. Let ak ¼ (ak, 0 , ak, 1 , . . . , ak, N 1 ) be the kth user signature vector, now used in the frequency domain. To form the MC-CDMA signal N components of vector bk ak manipulate in parallel amplitudes and phases of Mc ¼ N subcarriers f1 , f2 , . . . , fN during the pulse of duration Tp . Summation of all manipulated subcarriers produces the ith MC-CDMA symbol of duration Tp transmitted by the kth user. Certainly, with F ¼ 1/Tp implementing MC-CDMA is more feasible in a typical OFDM DFT-based form, but the direct way of generating the MC-CDMA signal shown in Figure 10.6 for the case of real (e.g. BPSK) alphabets of data symbols and signatures is more transparent as an illustration of the idea. Its generalization to complex alphabets is straightforward. In the OFDM implementation the IDFT unit replaces the multi-channel structure of Figure 10.6. In synchronous non-oversaturated systems, like mobile radio downlink, any set of K  N orthogonal signature vectors (Walsh functions etc.) might provide MAI-free separation of OFDM MC-CDMA user signals, since the orthogonality of the DFT spectra guarantees the orthogonality of OFDM symbols. Selection of signatures in asynchronous systems (e.g. mobile radio uplinks) is not that straightforward, although some minimax signature ensembles characteristic of asynchronous DS CDMA (see Section 7.5) may be of interest for MC-CDMA, too [105–107]. There is one more complication related to designing MC-CDMA signatures which is especially topical for mobile uplinks: the real envelope of the MC-CDMA signal, in contrast to that of DS CDMA, has significant variations, making the peak-factor perceptibly greater than

kth user datastream

×

×

ak,0

cos(2π f1t)

×

×

ak,1

cos(2π f2t)

×

×

ak,N – 1

cos(2π fNt)



MC symbols

Figure 10.6 Generation of kth user MC-CDMA signal

324

Spread Spectrum and CDMA

one. This issue is to be taken into consideration and, all other factors being the same, of the many candidates the signature set providing the smallest peak-factor should be preferred. Figure 10.7 presents a generic (non-DFT-based) structure of the kth user’s MC-CDMA receiver. It consists of N ¼ Mc channels, each tuned to its own frequency and realized as a complex correlator processing the observation complex envelope Y_ (t). To counter flat fading within each frequency subchannel, the complex value z_k, i from the ith correlator output is weighted by a complex coefficient wi and multiplied by the conjugated signature symbol ak, i . The last operation is nothing but despreading in the frequency domain. Summation of such products over all subchannels produces the statistic z_k to be used in estimating the kth user’s current data symbol bk . Again, in a DFT realization the DDFT unit replaces the set of correlators. Let us briefly touch upon the issue of choosing weight coefficients wi , i ¼ 1, 2, . . . , N. In the scenario of MC-CDMA this task is somewhat more complicated than in conventional MC transmission, due to the necessity of controlling MAI level. Suppose that all user signals pass through the same channel, as is the case, e.g., for a mobile downlink. Since subcarrier spacing F is no smaller than the channel coherence bandwidth, values ~_ , i ¼ 1, 2, . . . , N at the subcarrier frequencies may of the channel transfer function H i disperse independently in a wide range. Normalizing the channel transfer function as P  ~ 2 _ N 1 N i¼1 H i  ¼ 1 lets us characterize the kth signal undistorted intensity by amplitude Ak . Then the powers Pk , Pnk , Pl created by the useful signal, noise and the lth MAI, respectively, at the kth user output are calculated as: 2 2    X X N N  N  X 2 2 ~     2 ~   2 2 2 ak;i 1  jwi j ; Pl ¼ A  ak;i 1  H_ i w  ; Pnk ¼  _ a a w H Pk ¼ Ak  l;i 1 k;i 1 i i  l i   i¼1 i¼1 i¼1 Correlator

. zk,1

×

exp(–j2πf1t) . Y(t)

Correlator

. zk,2

. zk,N

exp( –j2πfNt)

a*k,0

w*1

×

exp(–j2πf2t)

Correlator

×



× a*k,1

w*2

×

× wN*

* ak,N–1

Figure 10.7 Generic scheme of MC-CDMA receiver

. zk

325

Spread spectrum systems development

where 2 is noise subchannel power. It is seen now that even if signatures are originally orthonormal: N X1 i¼0

al;i ak;i ¼ kl

the frequency selectivity over the subchannels may destroy orthogonality, amplifying some and suppressing other subcarriers. As a result MAI emerges so that not all Pl , l 6¼ k are zeros. To preserve signature orthogonality at the receiving end indepen~_ , i ¼ 1, 2, . . . , N, dently of the channel current state one should select wi ¼ 1/H i i.e. realize zero-forcing equalizing entirely compensating for the channel effects. This, however, is a mismatched processing whenever the channel amplitude transfer function is non-uniform, so that the penalty for complete suppression of MAI is loss in SNR q2k, zf corresponding to zero-forcing combining:   N  P  2  ak;i 1 2  N     ~ 2 Pk A2  A2k X 2 ak;i 1 2 H _ i  q ¼ q2k;zf ¼ ¼ 2k N i¼1 k;mf 2 2  ~  2  Pnk  P  i¼1 ak;i 1  H_ i  i¼1

q2k, mf

where is power SNR achieved with the matched processing, i.e. maximal ratio ~_  . For the case of originally equal intensities of all combining (Section 3.6.1) wi ¼ H pi ffiffiffiffi subcarrier components jak, i j ¼ 1/ N , i ¼ 1, 2, . . . , N SNR loss  ¼ q2k, mf /q2k, zf of zeroforcing combining versus the maximal ratio one (cf. (6.42)): ¼

N   1X  ~_  H i  N i¼1

2

ð10:33Þ

It is seen from (10.33) that when of the channel amplitude frequency   nonuniformity  ~_  distortion is remarkable (some H i  are close to zero), SNR loss, i.e. the penalty for radical elimination of MAI, may appear intolerable, and it is more reasonable to seek for a compromise between the levels of unsuppressed MAI and noise. One of the approaches of this sort leads to MMSE equalization, the idea of which is similar to that discussed in the previous section applied to multiuser detection. Details of this technique, as well as further insight into the spread spectrum MC philosophy, can be found in [105,106] and the numerous references listed there. In conclusion, we again stress that no hard barrier exists between DS and MC CDMA. They are just parallel technical ways of getting the same result: the spread spectrum signature. The latter may always be synthesized either as a superposition of harmonics in the frequency domain (MC) or by direct shaping in the time domain (DS).

10.2.4 Applications The penetration of the MC technique into digital telecommunication is presently very wide. Among examples of its practical application are the standards of digital audio and video broadcasting DAB, DVB-T etc. The positive experience accumulated to date

326

Spread Spectrum and CDMA

promises a remarkable attractiveness of MC-based versions of CDMA. In particular, MC-CDMA is currently considered as one of the most plausible platforms for 4G air interfaces.

10.3 Transmit diversity and space–time coding in CDMA systems 10.3.1 Transmit diversity and the space–time coding problem From the brief discussion of Section 3.6, we see that involving multiple receive and transmit antennas is a resourceful way of arranging the diversity branches necessary to oppose the destructive fading effects. Typically antenna arrays are employed for this purpose, consisting of elements spaced by several wavelengths to secure independence of their multipath patterns. The term multiple input multiple output (MIMO) serves to define the system jointly processing signals captured by several receive antennas from several transmitting antennas. Figure 10.8 gives a general description of a MIMO channel containing nT receive and nR transmit antennas. The ith transmit and jth receive antennas form a subchannel, whose current state is characterized by a complex fading coefficient H_ ij , i ¼ 1, 2, . . . , nT , j ¼ 1, 2, . . . , nR , which in the general case may be both time and frequency dependent. Usually, thanks to a special piloting, the receiver knows the channel state and is able to use coefficients H_ ij for an efficient joint processing (i.e. combining) of subchannel signals. As for the transmitter, it may be aware of the channel state and capable of adjusting the signal to current propagation conditions only if a reliable data feedback ‘receiver–transmitter’ is organized (closed loop transmit diversity). Suppose that there are only one transmit and nR receive antennas, and hence nR subchannels with fading coefficients H_ 1 , H_ 2 , . . . , H_ nR . Then the utilization of the potential of the receive diversity is in general terms just a proper combining of signals received by parallel antennas. It is not a big problem, at least in principle, since the receiver has signals of different antennas at separate outputs and (knowing the states of all diversity branches H_ j ) may process them in the best possible manner. The situation changes critically with the involvement of the transmit diversity, too. When parallel transmit antennas operate simultaneously, the receiver runs into the problem of separating their signals, which are superimposed on each other in every receive antenna, to further utilize the knowledge of subchannel states H_ ij and combine subchannel signals in ⋅ HnT nR ⋅ H2nR Transmitter

⋅ HnT 1 ⋅ ⋅ H1nR H22 ⋅ H12

⋅ HnT 2 Receiver ⋅ H21

⋅ H11

Figure 10.8 General model of MIMO system

Spread spectrum systems development

327

an appropriate fashion. To provide a chance of such separation, the data transmission through nT parallel transmit antennas should be arranged carefully, and ways of doing this constitute a subject of the problem called space–time coding. The name reflects the fact that the group of transmitted data bits is mapped one-to-one onto the two-dimensional nT  n codeword [uit ]. The i, t entry uit of the array is a code symbol transmitted by the ith antenna at the tth time moment, n being the code length. Note that in some cases the receive diversity may appear infeasible, e.g. in the mobile radio downlink, where the small dimensions of a handset does not give enough space for several receive antennas. In these scenarios the transmit diversity and, hence, an adequate space–time coding become especially valuable. In what follows we assume that only a single receive antenna is used to concentrate only on investigating the efficiency of the transmit diversity. This allows us to simplify designations of the channel fading coefficients, retaining only a single subscript pointing at the transmit antenna: H_ i1 ¼ H_ i .

10.3.2 Efficiency of transmit diversity A lot of research has been undertaken to evaluate the Shannon capacity, i.e. the potential rate of error-free data transmission, of MIMO channels, and the profitable role of antenna multiplicity has been proved for the basic fading models [108–110]. There is no wonder in the benefits of receive diversity, since extra receive antennas utilize signal energies from extra space points which would be lost irrevocably with a single antenna. With the maximal ratio combining of nd identical receive diversity branches, average power SNR grows nd times (see Section 3.6.1), and although this factor is not central in the improvement of error probability and channel capacity, it still makes this improvement readily predictable. Unlike this, the nature of gaining capacity or reducing error probability through transmit diversity is not that obvious, considering the division of the limited power resource between multiple transmit antennas. In fact, no gain in average SNR takes place under the maximal ratio combining of identical diversity branches with fixed overall power, unless the transmitter knows the channel state and is able to coordinate transmitting through different branches so that subchannel signals are summed coherently in the receive antenna. Indeed, let channel state information be unavailable to the transmitter and the total power P be equally divided between nd identical diversity branches (antennas, frequency channels etc.). Then the average power SNR per branch is q2 /nd , where q2 is the average power SNR, which would exist at the receiver with no diversity. Clearly, the maximal ratio combining would only increase average power SNR per branch nd times, making it equal to the one with no diversity. Accordingly, there are two contradictory trends in the transmit (as well as frequency etc.) diversity. On the one hand, increasing the number of branches, given the total power, provides a greater number of independent subchannels, which, supporting each other, secure higher probability that at least some of them are not poor. On the other hand, conditions (branch SNR) in each of the diversity subchannels become poorer with growth of nd . An accurate theoretical analysis shows that the first of these factors overweighs the second. We put aside mathematical derivations concerning the channel capacity, which may be found in the literature (e.g. [108–110]), but Problems 10.11 and 10.12 contain the plainest examples illustrating the issue. As for the positive effect of

328

Spread Spectrum and CDMA

transmit diversity on the error probability, it becomes obvious from the following consideration  of BPSK data transmission over the Rayleigh fading channel. Let Ai ¼ H_ i  be an amplitude-fading coefficient of the ith diversity branch with the average square normalizedPas A2i ¼ 1. Then the maximal-ratio combined current receid A2i (q2 /nd ), and, according to (2.19), conditional bit error ver SNR (see (3.15)) q2r ¼ ni¼1 probability Pe (A1 , A2 , . . . , And ), with the subchannel states Ai , i ¼ 1, 2, . . . , nd , fixed, is: Pe ðA1 ; A2 ; . . . ; And Þ ¼ Qðqr Þ

ð10:34Þ

To come to the unconditional bit error probability Pe we have to average (10.34) in all subchannel amplitudes Ai , i ¼ 1, 2, . . . , nd using their joint PDF W(A1 , A2 , . . . , And ). Due to the independence of branches this PDF is just a product of nd one-dimensional PDFs of all amplitudes, and: " # Z1 Z1 Z1 nd Y Pe ¼ . . . Qðqr Þ WðAi Þ dA1 dA2 . . . dAnd ð10:35Þ 0

0

i¼1

0

To make the integration variables of (10.35) separable, let us approximate the complementary error function Q(x) by its upper bound (see Problem 10.13) Q(x)  (1/2) exp ( x2 /2), x  0, coming to: nd 1Y Pe  2 i¼1

Z1 0

exp



 A2i q2 WðAi Þ dAi 2nd

For the channel with Rayleigh fluctuations PDF W(Ai ) obeys the law (3.12), which leads to: nd 1Y Pe  2 i¼1

Z1 0

2Ai exp



 nd   q2 1 2nd A2i 1 þ dAi ¼ 2nd 2 q2 þ 2nd

ð10:36Þ

Figure 10.9 demonstrates the behaviour of the bit error probability depending on the total average SNR q for 1, 2, 3, 4, 5 and 6 diversity branches. It is of great importance that two diversity branches provide a significant energy gain, error probability preassigned. For example, if a tolerable bit error probability is no greater than 10 4 , two diversity branches cut down the necessary transmitted energy by more than 15 dB. At the same time, with further addition of diversity branches the energy gain grows at a dropping rate, and, say, transition from 5 to 6 branches promises a saving of only around 1 dB of emitted energy. This explains why in many practical systems (e.g. mobile radio downlinks) two transmit antennas are chosen as a good balance between the diversity gain and equipment complexity. Note that when the number of branches tends to infinity the right-hand side of (10.36) turns into (1/2) exp ( q2 /2) (see Problem 10.14), i.e. an upper bound (dashed line in Figure 10.9) of the bit error probability for the case of a non-fading Gaussian channel. In other words, by increasing the number of transmit diversity branches one can in the limit (at least theoretically) completely eliminate the harmful effect of multipath propagation.

329

Spread spectrum systems development

0

–1

lgPe

–2

–3

–4

–5

0

5

10

15

20 q (dB)

25

30

35

40

Figure 10.9 Bit error probability versus overall SNR in the transmit diversity scheme for 1, 2, 3, 4, 5 and 6 diversity branches

10.3.3 Time-switched space–time code There may be different approaches to designing space–time codes depending on the fading model. Fast fading (see Section 3.5) implies such rapid fluctuations of the multipath pattern that values of the fading coefficient of the same subchannel at two adjacent symbol intervals are independent. In what follows we are dealing with the opposite case of slow fading, assuming that subchannel fading coefficients remain constant over all codeword duration. To accentuate the non-trivial character of the problem of designing codes securing separability of the signals of different transmit antennas at the receiving side, let us start with the simplest example. Example 10.3.1. Let the fixed power resource P be divided equally between nT ¼ 2 transmit antennas sending simultaneously the same data symbol with no measures allowing separation of subchannel signals at the receiver (repetition space–time code). Let a single receive antenna be used and the fading coefficients H_ 1 , H_ 2 of two subchannels be independent Gaussian complex numbers with zero means   and equal variances. This is exactly the case of Rayleigh   fading, since magnitudes Ai ¼ H_ i , i ¼ 1, 2 are subject to pffiffiffithe Rayleigh PDF. With a sent _ complex envelope S (t), the received one is (H_ 1 þ H_ 2 )S_ (t)/ 2, where the square root of two is responsible for power splitting. It is now evident that pffiffiffitwo subchannels form the resultant channel with an overall fading coefficient H_ ¼ (H_ 1 þ H_ 2 )/ 2, which is again   Gaussian with zero mean,   and the same variance as any of H_ i . Therefore, magnitude A ¼ H_  is Rayleigh and the resultant channel is again a Rayleigh fading channel. If the mean squares of Ai are normalized to one, A2 ¼ 1, too. Therefore, the resultant channel is absolutely identical to each of the subchannels, and using two antennas in this case cannot give any benefit as compared to a single antenna. In other words, the repetition code is a degenerated one, providing no real diversity.

330

Spread Spectrum and CDMA

As the example shows, the number of effective diversity branches may appear smaller than the number of transmit antennas. One of the most important parameters of any space–time code is the diversity gain, i.e. the number of really contributing diversity branches secured by the coding scheme (see Problem 10.15). The obvious way to provide separation of signals of different transmit antennas in the receiver is to emit the same data symbol by nT antennas by turns, i.e. with no time overlapping. In other words, one and only one of the transmit antennas emits the signal at each time, employing the total power resource. Then the situation is identical to that of multiuser TDMA communications, i.e. the signal of each antenna is identified by its time position and is orthogonal to others due to non-overlapping in the time domain. Thereby, the receiver observes all the subchannel signals not in the mixture but following successively in time with no mutual interference. Then, knowing the current fading coefficients H_ i , the receiver is entirely certain of which of these signals are more or less reliable, and able to combine them in any appropriate way, e.g. maximize SNR by using maximal ratio weighting. This simplest coding scheme corresponds to the time-switched space–time code. Example 10.3.2. Consider again the case of two antennas (nT ¼ 2) repeating transmission of the same current data symbol, this time operating in an intermittent manner: when the first emits energy, the second is inactive, and vice versa. The receiver observes the signals, one after another, passing through the subchannels with fading coefficients H_ 1 and H_ 2 , both distorted by additive noise of power 2 . To realize the maximal ratio combining, these observations are summed with weights H_ i , i ¼ 1, 2, respectively, resulting in power SNR (see (3.15)) qr2 ¼ (A21 þ A22 )qs2 /2, where qs2 is an overall ‘non-fading’ power SNR per one transmitted data symbol and halving arises due to splitting the fixed symbol energy between two antennas. For identical subchannels with magnitudes normalized to one (A2i ¼ 1) average power SNR is, of course, again the same as in the case of transmitting the whole symbol energy through a single subchannel: qr2 ¼ 2qs2 /2 ¼ qs2 . However, if the combiner is treated as the output of the resultant channel, the latter is no longer Rayleigh and has error probability smaller than a Rayleigh one under the same average SNR (see Figure 10.9). Thus, two diversity branches really exist and provide a predicted gain, which is achieved in return for two times smaller transmission rate per bandwidth unit. Indeed, the transmission rate in bit/s fixed, each antenna now transmits every data symbol over duration Tp /2, i.e. occupying a doubled bandwidth. One more instructive comparison is with the two-branch receive diversity system (nT ¼ 1, nR ¼ 2). It is easy to see that if a single transmit antenna uses the full interval Tp to transmit a current symbol, the receiver maximal ratio combiner provides average power SNR qr2 ¼ 2qs2 , i.e. 3 dB higher versus that in the transmit diversity scheme, energies per symbol equal. The roots of the energy loss of the transmit diversity against the receive diversity have been repeatedly pointed out: splitting total fixed energy between antennas in the transmit diversity scheme.

Time-switched space–time codes are very simple but they realize maximal diversity gain nT in exchange for widening bandwidth (rate fixed) and discontinuity of transmission, i.e. increasing signal peak-factor. This strongly motivates the search for space–time codes allowing separation of signals from different antennas despite their overlapping in time. The simplest, but very important, example of such codes is introduced in the next subsection.

Spread spectrum systems development

331

10.3.4 Alamouti space–time code The coding scheme proposed in [111] exploits two transmit antennas, operates with no extra bandwidth and offers maximal possible diversity gain for two antennas nd ¼ nT ¼ 2. Let b0 and b1 be two successive data symbols standing for even and odd time positions, respectively, and belonging to some fixed modulation alphabet (PSK, QAM etc.). Codewords of the Alamouti space–time code are 2  2 arrays of the form:     b0 b1 u u¼ ¼ 1 ð10:37Þ b1 b0 u2 meaning that code length n ¼ 2. As is seen, at the even symbol interval two antennas simultaneously transmit code symbols u10 ¼ b0 (first antenna) and u20 ¼ b1 (second antenna), while at the odd interval the transmitted symbols are u11 ¼ b1 (first antenna) and u21 ¼ b0 (second antenna). To put it another way, the antennas simultaneously transmit the length 2 sequences u1 ¼ (u10 , u11 ) ¼ (b0 , b1 ) (first antenna) and u2 ¼ (u20 , u21 ) ¼ (b1 , b0 ) (second antenna). This arrangement makes the sequences transmitted by the two antennas, i.e. vectors u1 and u2 , orthogonal: (u1 , u2 ) ¼ b0 b1 b1 b0 ¼ 0, securing separability of superimposed signals of different subchannels in the receiver. Actually, however, there is no need to fulfil the separation of subchannels as a special procedure, since the optimal (ML) detection of data symbols b0 and b1 automatically includes it, as well as maximal ratio combining. For a clear reason we assume that a single code symbol transmitted currently by one antenna utilizes on average half of the total average symbol energy Es . Let Y_ ¼ (Y_ 0 , Y_ 1 ) be an observation vector whose components Y_ t , t ¼ 0, 1 are samples of the complex envelope at the symbol matched filter output pffiffifor ffi even and odd positions, respectively, normalized for convenience by the divisor Es / 2. Then: Y_ ¼ H_ 1 u1 þ H_ 2 u2 þ n

ð10:38Þ

where n is a two-dimensional vector of independent complex Gaussian noise samples with zero means and equal variances. Then the ML rule (see Chapter 2) gives out b^0 and b^1 as estimations of data symbols b0 and b1 if they minimize the Euclidean (squared) distance between the observation Y_ and the useful component H_ 1 u1 þ H_ 2 u2 :  2 d 2 ðH_ 1 u1 þ H_ 2 u2 ; Y_ Þ ¼ Y_ H_ 1 u1 H_ 2 u2  ¼ ðY_ H_ 1 u1 H_ 2 u2 ; Y_ H_ 1 u1 H_ 2 u2 Þ

Distributivity and symmetry ((u, v) ¼ (v, u) ) axioms of the inner product along with orthogonality of u1 , u2 allow getting:  2  2  2 d 2 ¼ Y_  2Re H_ 1 ðY_ ; u1 Þ 2Re H_ 2 ðY_ ; u2 Þ þ H_ 1  ku1 k2 þH_ 2  ku2 k2

where d 2 is a shortened designation for the squared distance in question, or after substituting u1 , u2 from (10.37):  2 2Re b1 ðH_ 2 Y_ 0 H_ 1 Y_ 1 Þ d 2 ¼Y_  2Re b0 ðH_ 1 Y_ 0 þ H_ 2 Y_ 1 Þ

 2  2   þ H_ 1  þH_ 2  j b0 j 2 þ j b1 j 2

332

Spread Spectrum and CDMA

The transformed observation samples: z_0 ¼ H_ 1 Y_ 0 þ H_ 2 Y_ 1 ; z_ 1 ¼ H_ 2 Y_ 0

H_ 1 Y_ 1

ð10:39Þ

as well as the norm of the observation vector do not depend on variables b0 , b1 , with respect to which d2 has Therefore, in the equation above we are  2 to be minimized.  allowed to replace Y_  with jz_0 j2 þz_1 j2 , coming to:

 2  2  d 2 ¼ jz_0 j2 2Reðb0 z_ 0 Þ þ jb0 j2 þ H_ 1  þH_ 2  1 jb0 j2

 2  2  þjz_1 j2 2Reðb1 z_1 Þ þ jb1 j2 þ H_ 1  þH_ 2  1 jb1 j2

It is evident now that minimizing d 2 in b0 , b1 breaks into a separate minimization of two 2 2 2 2 2 2 2 2 functions of one variable 2 d (b0 ) ¼ jz_0 b0 j þH jb0 j and d (b1 ) ¼ jz_ 1 b1 j þH jb1 j , 2  2     _ _ 1, with respect to b0 and b1 . Thus, the estimates of the data where H ¼ H 1 þ H 2 symbols b0 , b1 are found as:

 b^l ¼ arg max jz_l bl j2 þH 2 jbl j2 ; l ¼ 0; 1 ð10:40Þ bl

where z_l is defined by (10.39) and minimization is done over all values of bl within the given data symbol alphabet. In the particular case of PSK data modulation jbl j2 ¼ 1 and the only component of the first term of (10.40) dependent on bl is Re(bl z_l ), which turns the decision rule into the ordinary form of PSK demodulation (see Section 7.1.2), but based on the modified matched filter statistics z_l : b^l ¼ arg max½Reðbl z_l ފ; l ¼ 0; 1 bl

ð10:41Þ

Let us fix transmitted symbols bl , l ¼ 0, 1 and fading coefficients H_ i , i ¼ 1, 2. Then useful components of the decision statistics z_ l , l ¼ 0, 1 can be evaluated by averaging Y_ 0 and Y_ 1 in (10.39) with respect to an additive noise. Denoting this operation by En fg, we obtain (see (10.38)) En fY_ 0 g ¼ H_ 1 b0 þ H_ 2 b1 , En fY_ 1 g ¼ H_ 1 b1 þ H_ 2 b0 , so that: En fz_ 0 g ¼ ðA21 þ A22 Þb0 ; En fz_ 1 g ¼ ðA21 þ A22 Þb1   where, as before, Ai ¼ H_ i , i ¼ 1, 2. It may be seen now that the useful component of zl is formed as though no separation problem existed and each symbol were transmitted over two independent diversity branches, further maximal-ratio combined (see Section 3.6.1). In the same way, the variance 2z of a real or imaginary part of the additive noise entering z_l is 2z ¼ (A21 þ A22 )2 where 2 is the variance of the real part of a noise sample in (10.38). Then power SNR q2zl for each of the statistics z_l , l ¼ 0, 1 is: q2zl ¼

jEn fz_l gj2 ðA21 þ A22 Þjbl j2 ¼ 2 2z

Now take into consideration the randomness of Ai , i ¼ 1, 2, bl , l ¼ 0, 1, and average q2zl

with respect to all random factors to come to the mean SNR q2zl for each of the statistics z_l , l ¼ 0, 1. Under a natural normalization of fading coefficients and modulation

Spread spectrum systems development

333

alphabet A2i ¼ 1, i ¼ 1, 2, jbl j2 ¼ 1, l ¼ 0, 1, q2zl ¼ 2/2 , and since n in (10.38) was norpffiffiffi malized by Es / 2, and noise variance at the symbol matched filter output is N0 Es /2 (see (2.15)), 2 ¼ N0 /Es . The resulting equation is then q2zl ¼ 2Es /N0 ¼ q2s , showing that the Alamouti scheme, as well as the time-switched code, preserves the same average symbol SNR as the no-diversity scheme, providing diversity gain nd ¼ nT ¼ 2. We stress again that the advantage of the Alamouti code against the time-switched one is the absence of pauses in emission, entailing better peak-factor and higher spectral efficiency. The Alamouti code is a full-rate one, meaning that two independent modulation symbols are transmitted over two-symbol duration. In general, a space–time code of length n, which allows transmitting k independent data modulation symbols, has rate R ¼ k/n. Full-rate codes are preferable, since they involve no extra bandwidth compared to a single-antenna transmission. The existence of more full-rate codes securing maximal diversity gain nd ¼ nT strongly depends on the modulation alphabet. For real modulation alphabets (e.g. BPSK) full-rate codes exist for several values of the number nT of transmit antennas, while for complex modulation symbols (QPSK, QAM etc.) the Alamouti code is unique2 [112]. At the same time, several interesting constructions of space–time block codes become available for both complex and real alphabets if the full-rate restriction is removed [110,112] (see also Problems 10.16 and 10.17). We refer the reader wishing to gain more information on this issue and become familiar with other aspects of space–time coding to works [110–113] and the papers cited in [110].

10.3.5 Transmit diversity in spread spectrum applications Seemingly the spread spectrum concept offers a very direct and easy way of providing transmit diversity. Indeed, the main bottleneck of the transmit diversity is separation of signals emitted simultaneously by different transmit antennas at the receiver side. One may get round this stumbling block by spreading the signals of different antennas using different (orthogonal) spreading codes. This at first sight obvious tool of the transmit diversity is, however, far from universal. As a matter of fact, orthogonal sequences in CDMA systems are a deficit resource, since their number determines the potential number of users. Thus, in a saturated (K ¼ N ) or, more so, oversaturated (K > N ) CDMA downlink there are no spare orthogonal sequences for arranging transmit diversity, which makes the space–time bandwidth saving codes equally valuable in CDMA applications, too. The way of incorporating the Alamouti code into the DS CDMA downlink is straightforward and does not require an extra signature resource. Let S_ k (t) be the complex envelope of the kth user signature (treated as a signal of the same duration Tp as the data symbol) and bk, 0 , bk, 1 be even and odd data modulation symbols sent to the kth user. Then it is enough only to use in the array (10.37) the DS spread symbols bk, 0 S_ k (t) and bk, 1 S_ k (t) in place of b0 , b1 , respectively, to arrange the transmit diversity on the basis of a fixed signature S_ k (t).

2

We do not consider as different trivial modifications of (10.37) preserving row orthogonality and row norms, like a common conjugation or/and multiplication of rows by 1 as well as by any fixed complex number of magnitude one.

334

Spread Spectrum and CDMA

 The first and second antennas then transmit the signals bk, 0 S_ k (t) bk, 1 S_ k (t Tp ) and  bk, 1 S_ k (t) þ bk, 0 S_ k (t Tp ), respectively, over two consecutive symbol intervals. Despread ing these signals by the reference S_ k (t) þ S_ k (t Tp ) removes the signature and turns the entire problem into the one discussed in the previous subsection. This principle, with a slight modification, is used in the UMTS downlink for arranging an open loop (without user-BS feedback) transmit diversity [114,115]. To be fair, processing synchronization signals (time-delay measurement) encoded by Alamouti code in a user’s terminal would appear much more complicated as compared to data demodulation. For this reason the transmit diversity mode employed in the synchronization channel is the time-switched coding touched upon in Section 10.3.3 [115]. One more interesting detail is using closedloop diversity in the dedicated (i.e. assigned to a specific user) physical channels. Based on the feedback MS-BS data, the BS knows the current state of the channel linking the BS with the specific user and adjusts the phases of the signals of two transmit antennas to make them sum coherently at the terminal input. The amplitudes of the transmitted signals may also be adjusted to realize the maximal ratio combining in the receive antenna and bring the efficiency of transmit diversity nearer to that of the receive one. The cdma2000 downlink specification includes some similar solutions concerning transmit diversity.

Problems 10.1. Let the first signature a1 be a linear combination of the other signatures. Prove that the linear system (10.12) has no solution, i.e. suppression of MAI automatically removes the useful effect too. 10.2. There is a three-user synchronous DS CDMA system. The signatures are binary of spreading factor N ¼ 3: a1 ¼ ( þ ), a2 ¼ ( þ ), a3 ¼ ( þ ). Find the reference of the first user’s decorrelating receiver, demonstrate elimination of MAI, and evaluate SNR loss of the decorrelating algorithm to the matched filtering. 10.3. Derive the gradient of the function (10.19) and prove that u given by (10.20) is the point of minimum of this function. 10.4. Prove the matrix inverse lemma in the form (10.21). 10.5. Find the reference vector for the MMSE detector for the conditions of Problem 10.2, setting all signature amplitudes and noise variance equal to one. Calculate SINR at the MMSE detector output, compare it with those of the decorrelating detector and matched filtering (Problem 10.2), and explain the results. 10.6. A synchronous CDMA system accommodates 128 users within the spreading factor N ¼ 96. The signatures are columns of the 128th order Hadamard matrix, in which 32 rows are discarded. Find MMSE reference vectors for all users, if their signals have equal intensities. 10.7. The MC-DS-CDMA downlink is realized using three subcarriers. Data is transmitted at each subcarrier by BPSK at the rate 32 kbps with spreading factor 64. The guard frequency interval equals 0:5/D, where D is signature chip duration. How would the potential number of users change if DS-CDMA replaced MC-DS-CDMA? 10.8. Data should be transmitted using QPSK at the rate 2.88 Mbps over a channel whose coherence bandwidth Bc ¼ 50 kHz. Find the minimal number of subcarriers

335

Spread spectrum systems development

10.9.

10.10. 10.11.

10.12.

10.13. 10.14.

10.15.

10.16.

necessary for MC transmission. What is the minimum length of DFT in the OFDM scheme, if the overhead due to the guard intervals should not exceed 10%? A synchronous MC-CDMA downlink in the OFDM version transmits data using QPSK at the rate 40 kbps over the channel with delay spread max ¼ 10 ms. How many users can it serve if all undistorted signatures are orthogonal and the overall bandwidth is 5 MHz? Would it be reasonable to use zero-forcing combining in MC-CDMA operating on the Rayleigh subchannels? Suppose that nR antennas receive in parallel the signal transmitted by a single antenna, intensities of all received signals are the same, as well as of independent Gaussian noises corrupting the signals. How does the Shannon capacity of such a channel differ from that corresponding to a no-diversity case, if the receiver knows the path length differences of all signals? Suppose that a transmitter is capable of transmitting data involving nd independent identical diversity branches, total transmitted power being fixed. Suppose that the intensities of all received signals are the same, as well as the independent Gaussian noises corrupting the signals, and the receiver (but not the transmitter!) knows the path length differences of all signals. What is better from the angle of Shannon capacity: to transmit the same or different datastreams over nd branches? Prove the upper bound on the complementary error function: Q(x)  (1/2) exp ( x2 /2) for any x  0. Prove convergence of the right-hand side of (10.36) to the upper bound of the error probability for a single non-fading branch: (1/2) exp ( q2 /2), when the number of branches grows without limit. According to the strict definition [110,112,113] the diversity gain is the minimal rank among all pairwise differences of distinct space–time codewords, i.e. nT  n arrays [uit ]. Prove that for the Alamouti code this diversity gain equals 2. Find the rate (in data symbols per code symbol) and diversity gain of the space– time code with real symbol codewords [112]: 2

b1

b0

6 u ¼ 4 b1

b0

b2

b2

b3

7 b2 5

b3

b3

b0

3

b1

10.17. Find the rate (in data symbols per code symbol) and diversity gain of the space– time code with complex symbol codewords [116]: 2

b0

6 u ¼ 4 b1

b2

3

b1

b2

0

b0

0

0

b0

7 b2 5

b1

336

Spread Spectrum and CDMA

Matlab-based problems 10.18. Write and run a program simulating conventional, decorrelating and MMSE detectors for arbitrary synchronous signature set and random user signal intensities. Recommended steps: (a) Form the N  K matrix of K normalized signatures of length N. (b) Take the first user’s amplitude equal to one and all the rest random, obeying the Rayleigh law with unit square mean. (c) Add Gaussian noise to the amplitude-scaled signatures with variance corresponding to a pre-assigned bit SNR qb . (d) Find the references and calculate SINR for all three types of the first user detector (the decorrelating one does not exist for linearly dependent signatures). (e) Varying the noise level, signature intensities remaining fixed, build the SINR curves in dependence on bit SNR qb . (f) Study the cases of the following signature sets: orthogonal sequences (K  N), cyclically shifted m-sequences (K  N) and Welch-bound sequences (K > N), and comment on the results. 10.19. Write and run a program illustrating the principle of OFDM modulation and demodulation (see Figure 10.10). Recommended steps: (a) Set the number of DFT points (frequencies) Mc . (b) Form and plot a random pattern of Mc source bits. 0.4 1.0 OFDM sym

SRC bit

0.5 0.0 –0.5 –1.0 10

20 Bit number

0.3 0.2 0.1 0

30

0

10

20

30

20

30

t 0.8 Out OFDM sym

DMD bit

1.0 0.5 0.0 –0.5

0.6 0.4 0.2

–1.0 10

20 Bit number

Figure 10.10

30

0

0

10 t

Simulating OFDM for Mc ¼ 32

Spread spectrum systems development

337

(c) Calculate the IDFT of the bit pattern. (d) Attach a cyclic prefix and plot the OFDM symbol obtained. (e) Set a random channel delay profile, i.e. integer delays, amplitudes and phases of multiple paths; take the delay spread within 4–6, Rayleigh amplitudes and uniformly distributed over [ , ] phases, all independent of each other. (f) Calculate and plot the OFDM symbol distorted by the channel. (g) Discard the prefix and tail (due to a channel delay) samples, and calculate the DFT of the vector obtained. (h) Calculate the channel transfer function and divide the DFT by it. (i) Demodulate the samples obtained into bits. (j) Plot the demodulated bit pattern and compare it with the transmitted one. 10.20. Write a program to analyse the effect of choice of orthogonal MC-CDMA signatures on the peak-factor of multicarrier symbols. Run the program for the Walsh-function signature set and complex signatures being cyclic shifts of the polyphase codes of Section 6.11.2. Explain the discrepancy in peak-factor for these two signature ensembles. 10.21. Write a program demonstrating the gain of Alamouti space–time coding versus the no-diversity system for BPSK data transmission over the Rayleigh channel. Recommended steps: (a) Take a stream of Lbs ¼ 104 105 random independent bits. (b) Set their amplitudes independently according to the Rayleigh fading model with the average square equal to one. (c) Add Gaussian noise of a suitable variance to have pre-assigned average bit power SNR q2b . (d) Demodulate the observation obtained and calculate the empirical bit error rate. (e) Split the original bit stream into pairs of even and odd bits. (f) Encode every pair of even and odd bits by rule (10.37), forming two new streams of length Lbs corresponding to two antennas. (g) Form two subchannel amplitude vectors, consisting respectively of even and odd elements of the set of item (b); assign to every element of these vectors random independent phase uniformly distributed over the interval [ , ]. (h) Use the first of vectors of item (g) to imitate Rayleigh fading in the first subchannel, assigning its elements to every pair of consecutive bits of the first antenna bit stream as complex amplitudes; do the same for the second antenna bit stream using the second vector of the item. pffiffiprevious ffi (i) Sum the vectors obtained, dividing the result by 2, and add the same noise as in item (c). (j) Demodulate the observation obtained according to rule (10.41), which for BPSK takes the simplest form: b^l ¼ sign[Re(zl )], l ¼ 0, 1. (k) Calculate the empirical bit error rate and compare it to that of item (d). (l) Run all previous steps, varying bit SNR, and build empirical dependences of the bit error rate on SNR for both transmission modes; compare the results with those predicted from Figure 10.9 and explain the discrepancy, if any.

11 Examples of operational wireless spread spectrum systems

11.1 Preliminary remarks As was repeatedly underscored in previous chapters, spread spectrum is the basic philosophy of numerous up-to-date and forward-looking wireless systems, ranging from radar and navigation to mobile radio and local area networks. The commercial benefits of spread spectrum technology are brightly confirmed by the impressive market success of 2G cdmaOne (IS-95) mobile telephone, as well as by the consolidation of the international telecommunication community in approving of CDMA as the primary 3G-and-beyond platform. There are a good deal of candidates to illustrate real applications of spread spectrum and CDMA, but we will dwell on only three of them in this chapter, chosen for their outstanding importance both today and in the years ahead, along with their high educational instructiveness. The systems under discussion have already been referred to in the text exemplifying practical implementation of some or other particular principle or idea.

11.2 Global positioning system It is quite natural for an object moving on the earth’s surface or in space to be interested in knowing its current position. The problem of positioning is the basic aim of navigation. Modern navigation equipment is required to inform a user about his instantaneous coordinates, velocities along all coordinate axes, current precise time, predicted position at one or another moment, etc. The most advanced and universal system providing a solution to these tasks is the Global Positioning System (GPS), the operational capability of which was officially declared by the USA in 1993.

Spread Spectrum and CDMA: Principles and Applications Ó 2005 John Wiley & Sons, Ltd

Valery P. Ipatov

340

Spread Spectrum and CDMA

11.2.1 General system principles and architecture Three coordinates may describe the position of an object on or above the earth’s surface, i.e. latitude, longitude and altitude. In trying to determine them, the object may measure distances (ranges) to three fixed points (beacons) whose coordinates are known in advance with high accuracy. This results in three equations whose three unknowns are exactly the coordinates of the object. In solving them the object learns its own position. In radio navigation distances are measured via the propagation delay of signals transmitted by the beacons: the distance is just the product of the propagation delay and the speed of light. All beacon transmitters are typically strictly synchronized to each other, operating in a unified system time. Unlike this, the clock of any individual user is usually biased relative to system time, and due to frequency drift and instability the userto-system clock offset proves to be an additional (fourth) unknown. Fixing the time of arrival of a beacon signal versus his local clock, the user will not learn the true propagation delay, since the time-offset is added to it. The easiest way to eliminate this unknown contribution would be to measure the distance by a two-way ranging method, where a beacon sends its signal in response to the user’s ranging signal. This, however, implies that users are active, i.e. emitting some energy. The necessity for a beacon to distinguish users’ request signals and respond to each of them individually puts a strict limit on the system throughput, i.e. the number of users served. Serving an unlimited number of users is possible only with one-way-ranging, where all the users are passive, i.e. receiving only, which is often desirable for security reasons, too. Then the user receiver can get around the problem of the user-to-system time-offset by measuring times of arrival of signals of four beacons instead of three. Each time of arrival will then contain a ‘genuine’ propagation delay plus the same unknown clock offset. Multiplied by the speed of light these measurements give pseudo-ranges: true ranges plus the product of the clock offset and speed of light. Thus, the user now has four equations with four unknowns, solution of which produces the user position as well as an estimation of the time-offset. This allows the user to fulfil simultaneous positioning and timing. The GPS is a space-based system meaning that satellites bearing navigation transmitters serve as beacons. Placing transmitters onboard the satellites opens the way to employing UHF radio waves for transmitting the navigation signals. Compared to the longer waves characteristic of earlier ground-based navigation systems (Loran, Omega etc.), UHF waves propagate only along a straight line, with no diffraction, so that trying to employ them in terrestrial transmitters would make positioning possible only within the horizon zone around a beacon. At the same time, the UHF band is much more favourable than longer waves with regard to the dimensions and mass of transmit and receive antennas as well as many other equipment components. The way of reconciling the desires to use the UHF band and to achieve a large coverage area of a navigation transmitter is now rather clear: just put a UHF transmitter onboard a satellite. If the satellite elevation above the earth is high enough, the transmitter will ‘illuminate’ a large spot on the earth’s surface, i.e. meeting the requirement for the size of the navigation coverage zone. The architecture of the GPS includes three basic segments. The space segment contains 24 main satellites (plus several reserve ones) deployed in 6 nearly circular orbits

Operational wireless spread spectrum systems

341

with 4 vehicles in each. The orbits are spaced 60 from each other in longitude, 55 inclined to the equator and have about 12 hours sidereal period. Such a space constellation makes no fewer than four satellites observable simultaneously above the 10 -elevation at any time of day and at any point on the globe. For most of the time, however, the number of observable satellites is greater, sometimes as high as 10. The higher the number of simultaneously visible space vehicles, the better is positioning and timing accuracy. Every satellite bears an atomic (rubidium or caesium) clock having extremely high stability: a day’s drift is around or less than 10 13 of the nominal frequency. Weather conditions have rather a small effect on the propagation of waves of the GPS band, so that the space segment provides all-time, all-weather positioning all over the globe. As was pointed out, a user is capable of calculating his position from the measured distances if and only if he is aware of the beacon coordinates. Since satellites revolve on their orbits, their coordinates change constantly and their instantaneous values should be available to a user at any time when he wants to fix his position. The instantaneous location of a satellite on an orbit is not absolutely deterministic due to random disturbances of one or another nature. Similarly, satellite clocks, although very stable, will sooner or later accumulate relative time-offsets, destroying positioning accuracy. Hence, it is necessary to monitor satellite positions and clock behaviour and keep users informed of them. To facilitate this procedure there is a control segment of GPS consisting of a main control station in Colorado Springs, Colorado, and five monitoring stations located in Colorado Springs, Hawaii, Kwajalein, Diego Garcia and Ascension Island. The monitoring stations run continuous tracking of all satellites, measuring their clock parameters, testing satellite state, etc. and via special communication links transmit the data to the master control station. The latter computes the current and predicted satellite locations, time-offsets and other relevant parameters, and transmits the fresh data to one of three ground control stations located at the same sites as the monitoring stations (Kwajalein, Diego Garcia and Ascension Island). The ground control stations upload the data to the GPS satellites, employing a dedicated S-band uplink. The user segment covers all users equipped with GPS receivers. There are a lot (at least hundreds) of receiver models currently on the market ranging from the simplest and cheapest handheld devices (used for sport or recreation) to very sophisticated and expensive models, designed for military purposes, surveying etc.

11.2.2 GPS ranging signals The master atomic oscillator of every GPS satellite outputs the frequency 10.23 MHz. Coherent frequency multiplication by 154 and 120 times produces two L-band frequencies L1 ¼ 1575:42 MHz and L2 ¼ 1227:60 MHz, further modulated by GPS ranging codes. There are two ranging codes: C/A-code (coarse acquisition or clear access code) and P-code (precision or protected code). Each satellite is assigned its specific pair of C/A- and P-code sequences. The upper carrier L1 is a basic one and its signal is available to any GPS receiver, while the lower frequency L2 is planned to be used by only authorized users for high-precision fixing.

342

Spread Spectrum and CDMA

Explanation of why two carriers help in accurate positioning lies in the propagation characteristics of the ionosphere, an upper atmosphere layer over 50 km above the earth. Having a high concentration of free ions and electrons due to the ionizing effect of the solar ultraviolet and X-ray radiation, the ionosphere is a dispersive medium, in which the ranging signal propagates at a speed different from that in vacuum, acquiring some additional delay. Unfortunately, this extra delay cannot be precisely pre-calculated due to the fast random fluctuations of medium parameters. On the other hand, the general character of dependence of an ionospheric delay on frequency is well approximated by an inverse square dependence with unknown proportionality coefficient. The latter may be found as the only unknown of the equation obtained by measuring the delays of identical signals on two properly spaced frequencies and subtracting the results. On completing this, the ionospheric correction can be found and removed from the measured pseudo-range. A C/A-code sequence serves to arrange a scale for positioning with moderate accuracy. It is a Gold one (see Section 7.5.2) of length N ¼ 1023 with chip duration (smaller than 1 ms) resulting in the signal period equal to 1 ms sharp. Certainly, the number (1025) of existing Gold sequences of length N ¼ 1023 is many times more than necessary for all GPS satellites, so that only some of these sequences are utilized. Periodically repeated Gold sequences modulate frequency L1 only and are continuously transmitted by satellites. Despite all satellites being strictly synchronized, the distances from them to a user change in the course of their revolution, so that the signals of different satellites arrive at the receive antenna with mutual time-offsets varying significantly. Since every satellite is identified by its specific Gold sequence and all these signals have low asynchronous cross-correlations, the user receiver is capable of separating each individual satellite signal from the others. In other words, the C/A-code scale of the GPS space segment employs Gold-ensemble-based asynchronous CDMA. Transmission of satellite coordinates (ephemeris) along with other relevant data (clock error versus the GPS time, corrections for propagation effects, satellite state etc.) is arranged in a DS spreading manner (see Section 7.1): the data bit stream with rate 50 bps BPSK directly modulates the Gold sequence before modulation of the L1 carrier. Thus, every data bit spans 20 periods of a Gold sequence, theoretically neutralizing corruption of correlation properties due to the presence of data modulation (see Section 7.3). The minimum package of data (frame) necessary for positioning occupies 1500 bits (30 s) organized into 5 subframes, each containing 300 bits. The first three subframes are repeated unchanged (except for reloading fresh data) in each frame, while the contents of the rest vary during the superframe covering 25 frames. For better transmission reliability the data stream is encoded by a (32,26) extended Hamming code. One important sort of data transmitted in the 4th and 5th subframes is the almanac: raw ephemeris of other satellites of the system. On capturing the signal of any one satellite the user gets the rough positions of the others and may use this information to accelerate the search for signals of the other satellites (see Section 8.3.1). The C/A-code provides standard precision of positioning and is available to any user equipped with a GPS receiver on a free-of-charge basis. The P-code is intended for higher precision positioning and so has chip duration 10 times smaller against the C/A-code (below 100 ns) or 10 times wider bandwidth (see Section 2.12.2 to recollect the relation between bandwidth and ranging accuracy). To realize the two-frequency

Operational wireless spread spectrum systems

343

ionospheric error compensation described above, the P-code (DS-modulated by the data bit stream similarly to C/A-code) is transmitted on both frequencies L1 and L2, quadrature multiplexing of C/A and P signals being used on L1 with 3 dB stronger C/ A-signal. In its turn, the L2 intensity is 3 dB lower than that of L1. The structure of the P-code is described in open GPS documents. It is formed as a symbol-wise modulo 2 sum of two very long binary sequences differing in length by 37 chips. The resulting period of the sequence thus formed is around 266 days. The non-overlapping 7-day (6:187104  1012 chips) segments of this sequence are used as P-codes for different satellites. The USA Department of Defense commissioned the designers of GPS to make provision for strict limitation of access to the P-code, reckoning that unauthorized usage of it may be hazardous to national security. Encryption of the P-code is realized by its modulo 2 summation with a masking or key W-code, whose structure is secret. The resulting Y-code possesses excellent cracking resistance (see Example 3.3.1).

11.2.3 Signal processing The basic operations of a single-frequency (L1) GPS receiver are very conventional for any DS spread spectrum system. After a coarse acquisition of a satellite C/A-signal (see Sections 8.2 and 8.3), aided when possible by a priori knowledge of satellite locations, the code delay-lock loop (Section 8.4) is locked and starts to output a sequence of estimations of a satellite pseudo-range. Typically, modern GPS receivers include a set of channels processing in parallel the C/A-signals of all visible satellites. On finishing the search for the last used satellite, the receiver is ready to produce the user’s coordinates, which is a steady-state process lasting for as long as the user wishes. The authorized receiver repeats the same operations for the P-codes of both carriers, spending only a little time on searching the signals, since the data frame available from the L1 signal contains a special handover word which facilitates setting the local generator of the P-code to an appropriate initial state. In many modern GPS receivers these basic operations are supplemented or replaced by a variety of others pursuing improvements of accuracy, speeding up of the initial fixing time, consumer convenience etc. For example, additional accuracy may be gained by measuring pseudo-ranges via integration of the carrier frequency of the received signal. The instantaneous Doppler frequency shift is proportional to the radial speed of the satellite relative to a user. Hence, the integral of the Doppler frequency over some period is proportional to variation of the satellite–user distance over this time interval. Having started from the point with precisely known coordinates, the receiver may further position itself via integrals of instantaneous frequencies of visible satellites, i.e. their current accumulated ranges. Moreover, methods of ambiguity resolution exist, making possible positioning through frequency integrals even without initialization at a known point [117,118]. Another hugely popular operational technique is so-called differential or relative positioning, the idea of which is as follows. Let one GPS receiver be set up at the reference site (base) with precisely known coordinates. Then comparing pre-computed satellite ranges with the measured ones, the base receiver can find systematic errors (biases) inserted by system imperfection. Let another receiver be placed at a remote

344

Spread Spectrum and CDMA

point with unknown coordinates. If the baseline, i.e. the distance between the base and remote receivers, is not very long (e.g. within tens of kilometres) the systematic errors at the base and remote sites are strongly correlated, so the remote receiver may subtract biases estimated by a base receiver from measured ranges, improving their accuracy. Of course, such system modification should contain a communication link providing delivery of base-receiver data to the remote receivers. A vast number of reference sites are now arranged all over the world, transmitting differential corrections via FM stations, broadcasting satellites, radio beacons, cellular radio, Internet etc. [117,118].

11.2.4 Accuracy The originally planned precision of C/A-code GPS positioning was set up around 100 m in the horizontal and 156 m in the vertical directions, the probability of keeping errors within these limits being 95%. Analogous figures for the P-code fixing were 16 m and 23 m, respectively. However, numerous advanced receiver structures developed by manufacturers have exhibited much better precision even without involving the P-code. This became a matter of anxiety for the US institutions responsible for national security, and in 1990 a selective availability mode was introduced, distorting satellite-transmitted ephemeris and timing and thereby deliberately corrupting positioning accuracy. During the subsequent decade, however, differential navigation, which eliminates these types of errors almost entirely, gained great popularity, so the selective availability mode turned out to be pointless in practice and was terminated in 2000. Nowadays a wide spectrum of offers is characteristic of the GPS equipment market, with proclaimed accuracies ranging from tens of metres to several millimetres and better.

11.2.5 GLONASS and GNSS The Russian space-based navigation system GLONASS has many common features with GPS. Its space segment consists of 24 satellites located in 3 nearly circular orbits with nominal sidereal period 11 hours 15 minutes and 64.8  inclination to the equator. Again, two frequencies L1 and L2 (respectively in the 1.5 and 1.2 GHz bands) are used to provide ionospheric correction, with C/A-code transmitted on L1 and P-code transmitted on both carriers. Current ephemeris and other relevant data encoded by Hamming code and properly arranged into subframes and frames are superimposed onto ranging codes in a DS manner and transmitted by satellites at the rate 50 bps. A control segment provides continuous monitoring of satellites, computation/prediction of their orbit parameters and uploading them to the satellite onboard memory. The substantial difference between GLONASS and GPS is that all satellites transmit the same C/A-code, which is a binary m-sequence of length N ¼ 511 with real-time period 1 ms. Distinguishing individual satellite signals is possible due to the small mutual carrier offsets between them, transforming the common C/A code into an ensemble of frequency-offset replicas of the m-sequence, as described in Section 7.5.1. In order to save bandwidth antipodal satellites of the same orbit (which are never seen by a user simultaneously) employ the same frequency offset.

Operational wireless spread spectrum systems

345

The accuracy of GLONASS is of the same level as that of GPS. Both systems are now considered as cooperative, entering the integrated Global Navigation Satellite System (GNSS). It has already been emphasized that increasing the number of processed satellite signals improves the positioning precision, so joint use of both constellations is obviously profitable. In addition, scenarios are not rare, where some satellites over the horizon are obstructed (e.g. by an aircraft wing), so that the total number of available ranging signals within only GPS or GLONASS is not sufficient for positioning. Then again, joint processing of GPS and GLONASS signals may give a considerable gain in positioning integrity. A great number of receiver models presently on the market or in development are capable of combined processing of signals of both systems.

11.2.6 Applications The role of satellite-based global navigation systems in the modern and future world can hardly be overestimated. Just simply naming the areas of their involvement forms rather a long list, including traditional navigation of ships, aircraft and terrestrial moving objects (cars, trucks etc.), transit systems, mapping utilities (e.g. pipelines), monitoring forestry and natural resources, farming, civil engineering, geodetic surveying, seismic forecasting, airborne mapping, seafloor investigations and many more. Not being able to go deeper into this fascinating topic, we direct the interested reader to the sources [117–119] and their references.

11.3 Air interfaces cdmaOne (IS-95) and cdma2000 11.3.1 Introductory remarks The first interim specifications of the 2G CDMA cellular telephone of standard IS-95 (presently referred to as cdmaOne, too) were published in 1993–1995, and the operational phase of IS-95 networks started in 1996. Nowadays networks of this standard cover huge territories serving tens of millions of consumers. Its impressive commercial success, widely recognized high quality of service and openness to further modernizations were among the decisive factors favouring the CDMA philosophy as the basic platform for the next generations of mobile radio (3G and beyond). Initially IS-95 was meant to gradually replace (maintaining compatibility with) an American analog standard, AMPS, operating in the 800 MHz range. The IS-95 documents set up frequency division separation of forward (869–894 MHz) and reverse (824– 849 MHz) links,1 while no limitation on frequency reuse in neighbouring cells or sectors was stipulated. The nominal bandwidth of the IS-95 signal is about 1.25 MHz, so that within the total assigned 25 MHz band an operator has remarkable freedom in carrier selection and frequency planning of the network. All the BSs entering a network are strictly synchronized via GPS to operate in a unified time scale, allowing MS easier

1

The terms ‘forward’ and ‘reverse’ links are synonyms of downlink (BS to MS) and uplink (MS to BS) adopted in the cdmaOne and cdma2000 specifications.

346

Spread Spectrum and CDMA

switching from one BS to another (handover). IS-95 and its 3G evolution cdma2000 are typical DS spread spectrum systems, which clearly manifest all the benefits of this technology. They also possess very high educational value, since they demonstrate in a lucid form practical ways of realizing many ideas studied above. In the text to follow we are going to dwell on only the most general principles of spreading, channelization, coding and modulation in the IS-95 and cdma2000 air interfaces. Readers who wish to acquire deeper knowledge may consult the sources [18,69,83,120,121] and many others.

11.3.2 Spreading codes of IS-95 The spreading sequences used in the IS-95 standard were partly mentioned in examples earlier. They are designed to provide CDMA separation of physical channels, distinguishability of signals of different BS arriving at the MS receiver and privacy of the transmitted data. Synchronous CDMA multiplexing of physical channels of the forward link served by a fixed BS is realized on the basis of Walsh sequences (see Section 2.7.3) of length N ¼ 64. The orthogonality of Walsh sequences allows separating the corresponding 64 physical channels theoretically with no MAI. The duration of a chip of Walsh sequences is nearly 0:81 ms and the chip rate is 1.2288 Mcps (megachip per second), resulting in the abovementioned bandwidth of 1.25 MHz. Certainly, the number of forward-link physical channels thus implemented is 64 and, consistent with the CDMA principle, they occupy the same common bandwidth with no frequency or time offset. All of the base stations use the same set of 64 Walsh functions, and the spreading by so-called short codes makes the signals of different base stations separable from each other in the MS receiver. There are two different basic binary short-code pseudonoise sequences, PN-I and PN-Q, used in the in-phase and quadrature-phase branches of the BS modulator, respectively. They are primarily generated as two m-sequences whose LFSR generators (see Section 6.6) contain 15 flip-flops and are defined by the primitive polynomials fI (x) ¼ x15 þ x13 þ x9 þ x8 þ x7 þ x5 þ 1 for PN-I and fQ (x) ¼ x15 þ x12 þ x11 þ x10 þ x6 þ x5 þ x4 þ x3 þ 1 for PN-Q. The sequences obtained have length L ¼ 215 1, but to come to the short codes PN-I and PN-Q they are extended by one more zero symbol following after 14 consecutive zeros. This brings the lengths to N ¼ L þ 1 ¼ 215 ¼ 32 768 chips, and with the same chip rate as for Walsh codes there are 37.5 periods of the short codes per second or 75 periods over two seconds. To discriminate between different base stations every one of them employs its BS-specific time-offset replica of the basic short-code sequences. There are 512 such pairs of replicas, every pair being shifted compared to the previous one by 64 chips or about 52 ms. The network planning should assign short-code pairs to the base stations in a way guaranteeing low risk of any MS receiving a signal from an unintended BS, whose timing due to propagation delay is about the same as that of the desired signal and whose strength is sufficient for mixing them up. It should be stressed that relative timeoffsets between the base stations entering a network, once set up, remain constant forever, since all the BS use GPS receivers to synchronize their clock oscillators with each other. One more spreading code is a long code, generated primarily as a binary m-sequence of memory 42. According to the specification a primitive polynomial of the LSFR

Operational wireless spread spectrum systems

347

42-stage generator of the long code prescribes feedback taps from flip-flops with numbers (counting left to right) 7, 9, 11, 15, 16, 17, 20, 21, 23, 24, 25, 26, 32, 35, 36, 37, 39, 40, 41 and 42. The m-sequence thus obtained is again extended by inserting one extra zero after a run of 41 consecutive zeros to come to the length N ¼ 242 . Using the same chip rate as before, the long code has period over 42 days. Different user-specific time-offsets (masks) of the long code are used in both the forward link for data protection and the reverse link for CDMA separation of MS signals along with simultaneous data protection (see below).

11.3.3 Forward link channels of IS-95 Logically, i.e. by their information content, there are four types of forward channels: . . . .

pilot channel synchronization channel paging channels traffic channels.

11.3.3.1 Pilot channel The pilot channel is unique for an individual BS and transmits ‘pure’ short code but no other data. It looks as though a data sequence of only zeros is DS spread by a short code. Being received by the MS it provides synchronization of its clock with the system (i.e. BS) clock up to the accuracy sufficient for forming a receiver coherent reference to despread and demodulate the received signal. Since the short-code period contains an integer number (512) of periods of Walsh sequences, these latter generated locally are automatically aligned with the spreading Walsh codes of the received signal after a receiver searches and DLL-captures the pilot signal. The Walsh function, being the first row of a Hadamard matrix of size 64 and consisting of only positive ones, physically separates (channelizes) the pilot channel from others. It is convenient to generate Walsh functions digitally, using binary f0, 1g logic, and then replace the zeros and ones by plus and minus ones, respectively, as (6.15) does. Figure 11.1a shows a simplified structure of the pilot channel where W0 symbolizes binary f0, 1g Walsh function number zero consisting of only zeros. As long as spreading by a short code is done for all forward channels commonly in the modulator, i.e. after summing signals of all channels, this operation is shown in the figure to come later. Trivially speaking, the pilot channel shown in Figure 11.1a feeds the modulator by a sequence of only plus ones. 11.3.3.2 Synchronization channel The synchronization channel is also unique for any individual BS. Figure 11.1b illustrates its general structure. Along with some other information, it transmits the data enabling the receiver to get a user-specific long-code mask and thereby synchronize its local longcode replica with the one used by the BS for data encryption and placing power control

348

Spread Spectrum and CDMA

W0 (sequence of zeros)

(a)

Zero bits

+

Mapping onto {±1}

mod2

To modulator (sequence of plus ones)

W32 (meander)

(b)

Sync. data 1.2 kbps

Conv. encoder

Interleaver

+

Mapping onto {±1}

To modulator

mod2

Figure 11.1 Simplified structures of pilot (a) and synchronization (b) channels

bits (see below). The raw data has rate 1.2 kbps and is arranged in frames whose duration coincides with the period of the short code (26.67 ms), each three frames combined in a superframe of 96 bits. The superframes are encapsulated in a message capsule, including 30 CRC symbols (see Example 9.2.4) to realize a message quality indicator. A convolutional code of rate 1/2 and constraint length 9 (see Section 9.3) provides strong protection for the data against channel interference. No tail bits are inserted, i.e. coder and decoder are not reset to the zero state at the end of every frame. The encoded stream rate is 2.4 kbps, but every symbol is treated as though the two-times shorter one is doubled (symbol repetition), so that the input rate of the subsequent interleaver is 4.8 kbps. The interleaver serves to decorrelate error bursts, thereby improving the error correction capability of the convolutional code against long fading drops of signal strength or other correlated degradations (see Section 9.5). Interleaving covers one frame of 128 code symbols (26.67 ms) and uses 16  8 matrix memory. The encoded stream is written column-wise into it and then read out according to the standard-defined pattern. The Walsh sequence that is the 33rd row of the Hadamard matrix of size 64 physically channelizes the synchronization data. Figure 11.1b shows again primary forming of the binary f0, 1g prototype W32 , which is simply a meander where 32 zero symbols are followed by 32 ones. The technique of DS spreading illustrated by the figure is a conventional one, based on the one-to-one correspondence between multiplication and modulo 2 summation within real f1g and logical f0, 1g alphabets, respectively (see Section 7.5.2). Accordingly f0, 1g symbols of the encoded and interleaved stream are symbol-wise modulo 2 added with W32 and the resulting stream is then mapped to the f1g alphabet. 11.3.3.3 Paging channels There are up to seven paging channels intended to notify a subscriber about calls coming from the network, to answer users’ requests initiating calls and to transmit other accessrelated information. The raw data is divided into slots of duration 80 ms consisting of

349

Operational wireless spread spectrum systems

Wi i = 1...7 Paging. data 9.6 kbps or 4.8 kbps Long code generator

Conv. encoder

User-specific time-offset

Interleaver

+

Mapping onto {±1}

To modulator

Decimator

Figure 11.2 Simplified structure of a paging channel

four 20 ms frames. Frames or their parts enter message capsules, each containing up to 1184 bits, including 30 CRC symbols. There are two possible rates of paging data: 9.6 or 4.8 kbps. Figure 11.2 presents a simplified structure of a paging channel. Its first unit is a convolutional encoder of rate 1/2 and constraint length 9. Similarly to the synchronization channel, tail bits are not introduced so there is no resetting of coder and decoder to the zero state at the end of frame. At the input rate 4.8 kbps the encoded stream rate is 9.6 kbps, but every symbol is treated as a doubled shorter one (symbol repetition), so that regardless of the raw data rate the encoded stream is of rate 19.2 kbps. The interleaver operates within 20 ms frames employing 24  16 matrix memory where encoded symbols are written column-wise. The order of reading from the memory is set up by the standard. The next operation over the encoded and interleaved stream is encryption, which is realized as scrambling, i.e. modulo 2 symbol-wise sum with a pseudorandom binary sequence. The latter is produced by decimation of the user-specific offset replica of the long code with index 64, i.e. taking every 64th symbol. In this way, the rate 1.2288 Mcps of the long code is divided 64 times, coming to 1228:8/64 ¼ 19:2 kcps. As such, the encryption is specific for any user, preventing an unauthorized interceptor from monitoring the access data sent by the BS. The Walsh functions with numbers 1 to 7 (second to eighth rows of a Hadamard matrix) are used for the channelization of paging channels. The primary paging channel formed by W1 is always available, while the rest may either be not activated or used as traffic channels. 11.3.3.4 Traffic channels The channels considered up to this point perform service functions necessary to start and maintain conveying basic messages to the user. The traffic channels are responsible for delivery of basic information: digitized voice, computer or multimedia data etc. To be specific, let us limit ourselves to speech transmission. The preliminary operation, then, is encoding of speech run by the unit called vocoder (voice coder). Leaving aside discussion of the rather complex principles of this device, just note that several types of vocoder are presently used in IS-95 equipment outputting speech data stream with nominal rates 8.6 or 13.3 kbps. The nominal rate corresponds to the highest speech

350

Spread Spectrum and CDMA

activity (when a speaker is talking unceasingly), while there are three smaller rates for lower activity. For the upper rate 8.6 kbps they are 4.0 kbps, 2.0 kbps and 0.8 kbps. The vocoder constantly traces the energy of analog speech over 20 ms frames and compares it with three adaptive thresholds to set an appropriate rate of digitized output. Rate reduction at periods of low speech activity is accompanied by proportional reduction of emitted signal power, so that the energy per bit remains constant. In its turn lower power means reduced level of MAI to other users inside2 and outside the cell, and eventually a greater number of users served by BS (see Section 4.6). The digitized speech stream is packed into 20 ms frames containing along with the information bits also CRC symbols and 8 tail bits resetting the convolutional encoder to zero. As a result, the set of rates of the 8.6 kbps nominal rate transforms at the channel input into the set RC1 of ‘raw’ rates 9.6, 4.8, 2.4 and 1.2 kbps.3 Let us turn to the block-diagram of a traffic channel in Figure 11.3. Input data at one of the four rates above arrives at the convolutional encoder of rate 1/2 and constraint length 9. Regardless of the input rate, the output rate due to symbol repetition is always 19.2 kbps, e.g. the stream of rate 1.2 kbps is encoded into one of true rate 2.4 kbps, but in this output stream each symbol is treated as 8 consecutive 8 times shorter symbols. The interleaver operates over 20 ms (384 code bits) permuting symbols of the codestream according to the pattern defined by the specification. The interleaver output is then scrambled in the same way as in paging channels to provide privacy of a transmitted message. In Sections 4.5 and 4.6 we stated that powers of MS signals should be effectively controlled to overcome the near–far problem and maintain MAI at the BS site below the destructive level. A closed power control loop is one of the arrangements running this task in IS-95. A BS monitors permanently the intensity of each of the received MS signals and sends a command ordering the MS to either increase or decrease its emitted power. The command is just a power control bit whose values zero and one dictate Wi Traffic data

Conv. encoder

Interleaver

+

Multiplexer

+

Mapping onto {±1} To modulator

Long code generator

User-specific time-offset

Decimator

PC bit positioning

Figure 11.3 Simplified structure of IS-95 forward traffic channel

2

Despite the forward channel being synchronous and not oversaturated, it is in practice not free of MAI: mutual multipath delays make different Walsh sequences non-orthogonal. 3 Apart from RC1, IS-95 documents also establish the set of raw rates RC2 for the nominal rate 13.3 kbps: 14.4, 7.2, 3.6 and 1.8 kbps; however, the codestream after the convolutional encoder again has the same rate of 28.8 kbps due to puncturing (see Section 9.3.1).

351

Operational wireless spread spectrum systems

increase or reduction of MS power, respectively. To insert the commands into the forward link signal every 20 ms frame after the interleaver is divided into 16 power control groups (PCG), each spanning 1.25 ms or 19:2  103  1:25  10 3 ¼ 24 code symbols of the 19.2 kbps codestream. In every PCG a single power control bit overwrites two code symbols. The MS receiver, knowing the positions of overwritten symbols (i.e. power control bits), excludes them from the decoding procedure as having nothing to do with the message contents. This is entirely equivalent to replacing an original convolutional code by a punctured one (see Section 9.3), and its negative effect on the code correction capability is believed to be partly mitigated by random positioning of the power control bits within PCG. The pseudorandom sequence at the output of the first decimator of Figure 11.3 has the same rate as the codestream, i.e. 19.2 kcps. During one 1.25 ms PCG there are 24 chips of this sequence. The last four of them are read as a binary number with the 24th chip giving the most significant bit. This number, ranging from 0 to 15, is used as a position number of the power control bit in the next but one group after the current one. Thus, the power control bit may take randomly any position out of the first 16 in every PCG. In Figure 11.3 the units implementing positioning and inserting power control bits are denoted as ‘PC bit positioning’ and ‘Multiplexer’. 11.3.3.5 Forward link modulation

From pilot, synchronization, paging and traffic channels

Figure 11.4 presents the block-diagram of the forward link modulator. Output voltages of all physical channels of BS are first weighted by appropriate gains to realize forward link power control. Every MS periodically informs the BS about the reliability of data received, and the BS properly adjusts the power level of the signal in the traffic channel assigned to this specific MS to maintain the data reception quality above the predetermined threshold. The weighted channel signals are then summed in the adder and fed in Channel gain

×

cos2πf0t

PN-I

Channel gain

×

Baseband filter

×



×

∑ ×

Baseband filter

×

Channel gain PN-Q

sin2πf0t

×

Figure 11.4 IS-95 forward link modulator

s(t)

352

Spread Spectrum and CDMA

parallel to the in-phase and quadrature branches of the modulator to be multiplied by the binary PN-I, PN-Q codes (see Section 11.3.2) and shaped in the frequency domain by the baseband filters. The multiplication of the in-phase and quadrature signals by cosine and sine CW components of frequency f0 with their subsequent summation performs up-conversion of the BS signal and finishes the modulation process. As is seen, the input baseband signal in both branches is the same. As such, it is a sum of multiple binary voltages, i.e. is multilevel real. Assume for a while that there is only a single physical baseband channel fed immediately to the modulator branches without summation with other channels. We may postulate that each physical channel is processed this way, i.e. there are as many modulator branch pairs as channels and the outputs of all these parallel modulators are added up coherently. Since the scheme of Figure 11.4 is linear, and hence the superposition principle is valid, its output effect is identical to that of the hypothetical scheme above, i.e. with individually modulated channels. That is why we may say that in the forward link of IS-95 DS spreading is used where the binary datastream (channelized by a Walsh function) modulates the QPSK spreading code (see Section 7.1). Since the rate of the codestream at the modulator input is 19.2 kbps, each symbol has duration covering 64 short code chips. Hence, the forward link spreading factor is 64. It is worth noting that the long code plays no role in DS spreading of the forward link signal, taking part only in data encryption and power control bit positioning. It is often said that forward link spreading is done by both Walsh codes and short PN-codes. Yet, conceptually classifying Walsh functions as channelizing and PN-codes as spreading may look more convenient.

11.3.3.6 MS processing of forward link signal Signal processing in the MS receiver rests on the classic procedures discussed in depth in the previous chapters. On successful acquisition of a pilot signal, the receiver DLL pulls in and continuously tracks the short code of the contacted BS. The local replica of the short code produced by DLL serves for despreading the received signal. The outcome of the despread pilot channel is a ‘pure’ CW carrier down-converted to appropriate intermediate frequency. A phase-locked loop tunes the local crystal oscillator to be coherent with this CW signal, providing thereby the reference for coherent data demodulation. After demodulation and deinterleaving the data transmitted over synchronization, paging and traffic channels are separated from each other in correlators using Walsh-sequence references, decoded by the Viterbi algorithm and used according to their destination. For example, a digital-to-analog converter transforms speech data of the traffic channel into voltage, which becomes audible with the aid of an earphone. Every MS receiver contains several (four or more) parallel channels capable of searching and tracking the pilot signal. One goal of it is arranging the RAKE receiver, which realizes the multipath diversity benefit of spread spectrum (see Section 3.7). Typically at least three such channels are used to implement RAKE fingers. Another procedure requiring autonomous pilot signal channels in the MS receiver is handover. A reserve correlator (or set of them) performs permanent scanning of the time domain, trying to determine if signals of other BSs are present, possibly more intense and

353

Operational wireless spread spectrum systems

preferable for contact. In the latter case the network may order MS switching to another BS, which is done easily, since the receiver is already tracking its signal (soft handover).

11.3.4 Reverse link of IS-95 According to the logical content of the data transmitted over the reverse channel every MS operates on one of two types of channels: . traffic channel . access channel.

11.3.4.1 Reverse link traffic channel Figure 11.5 presents a simplified structure of the reverse traffic channel. The MStransmitted bit stream (digitized speech from a vocoder, computer data etc.) with inserted CRC symbols is divided into 20 ms frames, where 8 tail bits are then inserted for zero-resetting of a convolutional encoder at the start of every encoded frame. As a result the nominal rate of data at the encoder input is 9.6 kbps, but for reduced voice activity three lower rates (4.8, 2.4 and 1.2 kbps) are also employed, in the same way as in the forward link. Due to the asynchronous nature of the reverse link, MAI—unlike in the forward link—would exist even in the hypothetical absence of multipath effects (see footnote 2). This qualitatively justifies the greater strain interference condition of the IS-95 reverse link, explaining why it exploits a convolutional code with higher error correction capability in combination with subsequent 64-ary orthogonal modulation. Since increasing the constraint length c would entail undesirable codec complications, its accepted value is the same as in the forward link ( c ¼ 9), reduction of the code rate to 1/3 being a payment for better distance properties. With such a code rate the output codestream rate is 28.8 kbps independently of input bit stream rate: the symbol repetition explained earlier for a forward channel is administered in the reverse link as well. An individual 20 ms frame of a codestream (576 bits) is divided into 16 power control groups of 36 bits (1.25 ms) each. An interleaver operating over the frame uses a 32  18 matrix, where the codestream is written column-wise. The reading runs row-wise, every pair of odd and the next even rows forming one PCG. However, consecutive pairs of

Traffic data

To modulator Conv. encoder

Interleaver

Long code generator

64-ary orthogonal modulator

User-specific time-offset

+

Mapping onto {±1}

Data burst randomizer

Deleted PCG positions

Figure 11.5 Simplified structure of IS-95 reverse traffic channel

354

Spread Spectrum and CDMA

rows are read according to a pattern providing adjacency of PCG repeating each other (due to encoded symbol repetition) whenever the raw datastream rates are smaller than 9.6 kbps (i.e. 4.8, 2.4 and 1.2 kbps). For example, when the raw rate is 4.8 kbps every even PCG contains repetition of the same interleaved code symbols as the previous; for the datastream rate 2.4 kbps the groups with numbers 4i þ 2, 4i þ 3, 4i þ 4 are replicas of the group number 4i þ 1, etc. Such an order is convenient for further lowering of the average transmitted power proportionally to the rate reduction, which is realized in the reverse link slightly differently as compared to the forward link (see below). The codestream from the interleaver is fed to the 64-ary orthogonal modulator, meaning that every 6-symbol block treated as a binary 6-digit number selects one of 64 orthogonal signals (a Walsh function of this number). This gives an extra coding gain (up to three times asymptotically; see Section 2.6) above that of convolutional coding. Since every 6 input binary symbols are now replaced by 64 binary symbols, the stream of chips at the orthogonal modulator output becomes 64/6 ¼ 32/3 times faster (307.2 kcps). Let us stress that Walsh functions in the reverse link bear no channelization functions and only implement spread spectrum orthogonal coding for data transmission, as discussed in Section 2.7.3. The next step in forming a traffic channel is spreading, i.e. modulo 2 summation of the binary symbol stream after the orthogonal modulator with the offset long-code sequence. Since the long code is a chip stream with rate 1.2288 Mcps, there are 4 longcode chips per Walsh symbol or 256 long-code chips per Walsh signal at the orthogonal modulator output. The BS receiver after despreading uses a 64-channel correlator bank, each channel being tuned to one of the Walsh signals, and decides in favour of the Walsh signal referencing the correlator with the strongest response. As such, a processing interval covers the whole Walsh function duration, i.e. 256 long-code chips, and the spreading factor of the reverse link appears to be 256. A long code is unique, strictly specified by the standard, and it is user-specific masks (time-offsets of the code) that secure CDMA separation of different users. Thus, we encounter here the strategy of asynchronous CDMA discussed in Section 7.4. Of course, these offsets should be properly assigned to have no risk of synchronous arrival at the BS of signals from two MSs migrating freely over the whole coverage zone. The value of offset is a current MS identity rendered to it by the network similarly to the channel carrier in FDMA. In parallel with the CDMA channelization, the user-specific mask provides the encryption (scrambling) of the stream after orthogonal modulator. Due to the enormous length of the long code, it is not an easy task for an unauthorized interceptor, who does not know the user’s mask, to synchronize a local long-code generator to the intercepted signal and despread (thereby descramble and decrypt) the data. The operation of mapping logical f0, 1g symbols onto the real modulation alphabet f1g is the same as before and does not require any special comment. One of the primary requirements for MS handset is a long enough battery lifetime. From this angle a linear power amplifier consuming higher average power is less attractive than a nonlinear (operating in a keying mode) one. That is the reason why in the MS transmitter average power reduction is achieved not by lowering an instant power, but alternatively by transmitting only one PCG of all those that replicate each other. For example, with a raw rate 2.4 kbps there are quadruplets of identical PCGs and only one of them is transmitted, while the transmitter is cut off during the three

355

Operational wireless spread spectrum systems

20 ms frame = 16 PCG

4

1

1

1

1

2

2

2

2

3

3

3

3

4

4

4

4

1

PCG 1.25 ms

Figure 11.6 Example MS transmission pattern for the raw rate 4.8 kbps

others. Certainly, this makes MS emission discontinuous. Randomization of the positions of discarded PCGs (data burst randomization) enables better averaging of discontinuous MAI at the BS. The pseudorandom pattern of gating off the PCG inside any frame is determined by the last 14 chips of a user’s mask, i.e. offset long-code replica, at the end of the previous frame. The rule defined in the specification for every particular raw rate recalculates values of these chips (as binary digits) into the positions of erased PCGs. Figure 11.6, where identical numbers mark replicated PCGs, and shaded and dashed rectangles correspond to transmitted and erased PCGs, shows an example transmission pattern for raw rate 4.8 kbps. We may treat the sequence after the data burst randomizer as ternary with symbols f1g and zero corresponding to active and pausing transmitter, respectively. 11.3.4.2 Access channel MS uses an access channel when responding to a notification about an incoming call in the idle state and when it either needs to register on the network or initiate a call. The procedures of framing, convolutional encoding, orthogonal modulation, interleaving and long-code spreading in the access channel are basically similar to those of the reverse traffic channel. Of course, no voice data is transmitted through this channel, so no rate/power control according to voice activity is performed. One of the specific features of the access channel relates to initiating access by MS. Not knowing precisely the propagation conditions in the reverse link, the MS starts by sending probe signals of low strength, gradually increasing the signal level with every next attempt until it obtains the BS confirmation that the connection is established. Probe signals are sent in a burst mode with randomized intervals to reduce the probability of colliding requests from several users, because it is not impossible that at the access stage different MSs have the same long code masks. 11.3.4.3 Reverse link modulation MS can never use both traffic and access channels simultaneously, therefore there is no need for channel signal summation at the modulator input as there was in the forward channel. Traffic or access channel output is immediately fed in parallel into in-phase/ quadrature branches, differing from those of Figure 11.4 in the following details. First, offsetting short codes PN-1 and PN-2 to identify BS is now needless (every mobile has its own unique identity—long code mask—all over the coverage zone), and even inconvenient

356

Spread Spectrum and CDMA

for simultaneous reception of the same MS signal by several BSs during a soft handover. Thus, all MSs use zero offset of the short code. Second, there is a half-chip delay inserted into a quadrature branch after a multiplier by PN-Q. This is done to convert QPSK into its version called offset QPSK (O-QPSK). The latter is believed to be preferable for battery lifetime. The conventional QPSK modulator in Figure 11.4 may be thought of as two BPSK modulators, operating independently with cosine and sine CW carriers. When binary symbols in both branches change into the opposite simultaneously, the phase of the QPSK signal hops by 180 , and the transmitter power amplifier should have linear dynamic range around the doubled signal amplitude. In O-QPSK, due to half-chip time-offset of symbol bounds, when one of two modulating binary streams changes, the other remains constant. Therefore, the maximal hop of the resulting signal phase is only 90 , softening the demand on the amplifier linear dynamic range and helping to make the battery lifetime longer.

11.3.5 Evolution of air interface cdmaOne to cdma2000 One of the main stimuli for promoting 3G standards was the extension of functionality of a mobile handset from just a telephone device to a terminal capable of high-speed data exchange with the network, receiving and outputting multimedia information, access to Internet etc. All of these novelties demand much higher transmission rates as compared to 2G systems, and the ultimate rate associated with the 3G philosophy is 2 Mbps. Such a dramatic rate increase with no compromise of quality of service and number of users served calls for a broader system bandwidth. It is characteristic of cdma2000 projects that, unlike the UMTS concept (see Section 11.4), they consider IS-95 as the starting point and allow for backward compatibility with it. Of all the technologies united by the common name cdma2000, the one based on the MC-DSCDMA principle (see Section 10.2.1) of the forward link looks most likely to be finally adopted. We cannot touch upon the details of this proposal here (whose extensive description is the subject of [69]), due to their complexity and possibly non-final state, so we give only a very short survey of the main ideas below. With three carriers (in future this number may increase) the cdma2000 forward link just repeats three times the spectrum of IS-95 occupying total bandwidth of about 3.75 MHz and using in each of three 1.25 MHz subbands spreading and modulation techniques somewhat different from those of IS-95. Unlike IS-95, where BPSK data modulates the QPSK spreading sequence, in cdma2000 both data and spreading code are of QPSK type. This allows doubling the duration of the codestream symbols, given the data rate, thereby increasing by two times (up to 128) the spreading factor per subband within the same chip rate. Certainly, greater spreading factor means doubled number of forward physical channels, and consequently potentially greater number of users served. But even more importantly, the number of parallel channels granted by the network to the same user may permit transmission of data at the number-of-channel times higher total rate. This multicode mode inherited from the IS-95B specification is one of the main resources for approaching the rates pre-assigned by the 3G concept. Another advancement of the cdma2000 forward link is employing transmit diversity, in particular a technique close to that discussed in Section 10.3.5. Since signals from different transmit antennas propagate along different paths, some extra pilot channels

Operational wireless spread spectrum systems

357

above the one of IS-95 are arranged, transmitting antenna-specific pilot signals from two BS antennas involved in diversity. This enables the MS to separate pilots of different antennas and have strictly synchronized references for the diversity signals to demodulate, decode and properly combine diversity branches. More complex organization of cdma2000 requires stronger systematization of logical forward channels. Instead of only four in IS-95, the hierarchy of logical channels in cdma2000 contains 10 only on the first layer, adding common control channel, common power control channel, broadcast control channel, quick paging channels etc. As for the traffic channels, they include, among others, the fundamental ones (primarily used) and supplemental channels involved in multicode transmission when very high rates not achievable with only fundamental channels are on request. The supplemental channels may use either convolutional or turbo codes (see Section 9.4). The reverse link of cdma2000 does not use the MC-DS-CDMA technique, being implemented as conventional DS CDMA with three times broader bandwidth (3.75 MHz). This corresponds to three times higher chip rate (3.6864 Mcps) of the long spreading code. With such high DS spreading rate, a number of solutions of IS-95 were revised and replaced by more relevant ones. First of all, a convolutional encoding rate 1/4 is used instead of 1/3, meaning that the raw data rate, say 9.6 kbps, after encoding becomes 38.4 kbps. Using QPSK data modulation and spreading such a codestream by a long code gives a spreading factor 2  (3:6864/38:4)  103 ¼ 192, which is not a critical loss as compared to 256 in IS-95. At the same time, the reduction of rate of a convolutional code of constraint length 9 to 1/4 returns some extra (non-asymptotic) coding gain. On this ground the designers decided to reject the orthogonal 64-ary modulation and bring the reverse traffic channel structure closer to that of the forward link. Another distinction is the long list of logical channels, including the reverse pilot channel, which now becomes obligatory, since in the absence of orthogonal modulation the BS should have a local coherent reference to demodulate the QPSK data of MS. There are other new logical channels, some of them running simultaneously. Being channelized by the Walsh signals, they are then linearly summed, meaning that the transmitter power amplifier should be linear so involving O-QPSK is needless. Thus, an ordinary QPSK data modulator is used, where the QPSK-mapped codestream is first multiplied by the QPSK spreading code and then the real and imaginary parts of the product modulate the cosine and sine CW carrier components, as explained in Section 7.1. Note that, similarly to the forward link, reverse supplemental channels may support a reverse fundamental (traffic) channel (one per MS), providing multicode transmission at the high rates unattainable with only fundamental channels. The supplemental channels may again use either convolutional or turbo codes.

11.4 Air interface UMTS 11.4.1 Preliminaries The UMTS (acronym of Universal Mobile Telecommunication System) is a 3G wideband CDMA standard whose development was pioneered by the European telecommunication community. Currently UMTS, along with cdma2000, enters the so-called IMT-2000 family, i.e. the list of standards declared by the International Telecommunication

358

Spread Spectrum and CDMA

Union (ITU) to be basic for 3G systems. There are two versions of UMTS: frequency division duplex (FDD) and time division duplex (TDD). As is immediately seen from the names, these systems differ from each other in the method of separation between downlink and uplink. In FDD-UMTS downlink and uplink occupy non-overlapping frequency bands, while in TDD-UMTS they employ different time slots. For brevity we limit the discussion below to only FDD-UMTS, keeping in mind that many solutions adopted in it are common to both systems. International regulatory documents allocate for FDD-UMTS in Europe frequency bands 1920–1980 MHz (uplink) and 2110–2170 MHz (downlink) with a limitation of 5 MHz on the link bandwidth. DS spreading is a fundamental technique securing separation of physical channels, in particular multiple access (DS CDMA). The standard sets a universal and constant chip rate 3.84 Mcps in full agreement with the bandwidth limitation. Like cdma2000, UMTS is a system in which the data transmission rate may vary in a very wide range. As a consequence of this, along with chip rate invariance, the spreading factor changes with transmission rate. In what follows we concentrate again on the physical layer of the system, i.e. solutions concerning spreading, channelization and modulation. Note that BSs of UMTS do not rely upon GPS support and operate with their own autonomous non-synchronized clocks. Although this architecture saves on BS equipment costs, it does, however, make cell search and handover procedures more complicated and is responsible for many distinctions between the physical layers of UMTS and cdma2000. Similarly to Section 11.3, we can hardly present here anything more than a very short sketch, but many recently published books dedicated to the UMTS standard [92,104,114,115,120–122] will help the interested reader to expand his/her knowledge about this system, which is likely to become dominant among mobile telecommunications in the near future.

11.4.2 Types of UMTS channels According to the terminology of the UMTS specifications there are logical, transport and physical channels. On the layers higher than physical the data is distributed between the logical channels on the basis of information content, but before arriving at the physical layer it is restructured into the transport channels. The criterion to distinguish transport channels is mode and format of data representation, while physical channels (which are just signals bearing messages), as in any CDMA system, are distinguished by their specific codes. The physical layer consists of two sublayers. The transmitted data arrives at the first physical sublayer from the upper layers packed into transport channels according to information content. The first sublayer includes among other things attachment of CRC for data block protection, channel coding and interleaving. Channel coding is either convolutional (constraint length 9, rates 1/2 or 1/3) or turbo coding (constituent encoders of memory 3, rate 1/3). For very high data rate uncoded transmission is possible, too. The second sublayer, i.e. radio link, covers mapping the transport channels to the physical ones (signals), and transmitting signals over the propagation medium. The signal received by MS (downlink) or BS (uplink) then undergoes all necessary reciprocal operations of the two sublayers (demodulation,

Operational wireless spread spectrum systems

359

deinterleaving, decoding etc.), reverse mapping when necessary, and passing the data over to the higher layers. Another classification applicable to both transport and physical channels discriminates between common and dedicated ones. The first of them contain data relating to the whole system and commonly used by all users, whereas the second serve to establish a connection between BS and individual MS. The time structure of all channels is strictly predetermined by the standard. All of them consist of frames of duration 10 ms (38 400 chips) and every frame is in its turn divided into 15 slots of duration 666:66 . . . ms (2560 chips).

11.4.3 Dedicated physical uplink channels A dedicated physical channel is the one which the network grants to the MS to utilize exclusively, i.e. two mobiles within the same cell can never use the same dedicated channel. There are two types of dedicated uplink channels: dedicated physical data channel (DPDCH)4 and dedicated physical control channel (DPCCH), whose names are consistent with their functionalities. The DPCCH transmits to the BS service information: the pilot signal necessary to estimate propagation parameters and synchronize BS coherent reference, message about the format of data in DPDCH, feedback information used in handoff and power control commands. There is always only one DPCCH per MS, and the transmitted user’s data arrives at the physical layer packed into one dedicated transport channel per MS. But this unique transport channel may be mapped to several (up to six) DPDCH, if the necessary rate surpasses the maximum provided by a single DPDCH. Multiplexing of dedicated channels is performed as follows (see Figure 11.7). The DPCCH is always transmitted through a quadrature branch of the QPSK modulator, while the first of the DPDCH is fed into the in-phase branch. The rest of the DPDCH, if any, are distributed between branches as equally as possible. Thus, despite the QPSK modulator involvement data modulation in the uplink is BPSK. The transmission rate over the DPCCH is always constant, equal to 15 kbps or 10 bits per slot. Then each bit occupies 2560/10 ¼ 256 chips and the spreading factor of DPCCH is always 256. The spreading factor of DPDCH, on the other hand, is variable depending on the necessary data rate and may change from 256 (minimal rate) to 4 (maximal rate). Thus the minimal data transmission rate is 15 kbps, while the maximal per DPDCH is 64 times higher, i.e. 960 kbps. Using up to six parallel DPDCH in the multicode transmission mode described in the previous section allows in principle a maximal rate of 5760 kbps. Certainly, the so-called gross rate (i.e. of codestream after a channel encoder) is meant, the raw datastream rate being lower proportionally to the channel code rate. Every uplink physical channel has its specific channelization code multiplied with encoded data. Figure 11.7 presents a scenario where all DPDCH are active, using six different channelization codes CC1–CC6 with designation CCc reserved for the channelization code of DPCCH. After multiplication by the channelization code all physical

4

The names and abbreviations of the UMTS channels reproduce exactly those of the UMTS documents.

360

Spread Spectrum and CDMA

CC1 DPDCH1

× CC2

DPDCH2

× CC3

DPDCH3

× CC4

DPDCH4

× CC5

DPDCH5

× CC6

DPDCH6

× CCc

DPCCH

×

Gd

× Gd

×

Σ

I

Gd

× Gd

To modulator (via scrambler)

× Gd

× Gd

Σ

Q

× Gc

×

Figure 11.7 Multiplexing of dedicated uplink channels

channels are weighted by their gains, implementing the reverse link power control. Actually, only two different gains are involved: whatever the number of DPDCH, all of them have the same gain Gd , while the gain of DPCCH is Gc . The maximal gain value is one, zero gain cuts off a channel, and the step of variations of gain value is 1/15.

11.4.4 Common physical uplink channels Common physical channels represent a resource that is at the common disposal of all mobiles. There are two types of common uplink channels: random access channel (RACH) and common packet channel (CPCH), the terms being used for both the transport and corresponding physical channels. The MS utilizes RACH to initiate a contact (e.g. call) with the network and to transmit short packet messages, CPCH being the main resource for MS packet transmission. Physical RACH (PRACH) contains a preamble of 4096 chips, which is 16-chip MS identifier repeated 256 times. The MS can start transmission over PRACH at the beginning of any of 15 access slots occupying together two frames, i.e. 5120 chips or 20 ms. The diagram of access slots is set up in the BS transmission format using a special transport downlink channel (broadcasting channel, BCH). At the initial stage the MS has

Operational wireless spread spectrum systems

361

no reliable knowledge about signal attenuation in the uplink, and the first transmission of preamble goes at low power. As long as no message comes from the BS confirming connection, the MS randomly selects new access slots and makes new attempts, each time increasing the signal power. After receiving BS confirmation, the MS transmits the message itself covering one or two frames (10 or 20 ms). There is no closed power control loop in PRACH, since the connection sessions on it are quite short. The structures of the physical CPCH (PCPCH) and PRACH are in general similar; however, the message segment of the PCPCH may occupy a larger number of frames and the preamble segment is followed by one more part: the collision detection preamble, which helps to recognize simultaneous attempts of several MSs to use PCPCH. Due to the longer duration of PCPCH packets the presence of a closed power control loop in it appears to be reasonable in contrast to PRACH. In the same way as in the dedicated channels, quadrature multiplexing is used in the common channels to combine information and service components of transmitted data. Separation of common and dedicated physical channels is performed by channelization codes, which are considered in the next subsection.

11.4.5 Uplink channelization codes As stated above, an individual MS uses several types of channels to be separated in the BS receiver. Since the same clock controls all the physical channels of the MS, synchronous code division is a good option to arrange separation between physical channels (multiple DPDCH, DPCCH, PRACH, PCPCH). Note that we are now discussing only the separation of channels of an isolated MS, signals of different mobiles remaining separated by asynchronous CDMA, as in cdmaOne and cdma2000. In the UMTS documents the channelization coding format is described by the binary tree establishing an iteration procedure. At every iteration any word of the preceding iteration generates two new words of double length by appending either itself or its negation. Let ck be some code vector obtained at the kth iteration. Then two code vectors of double dimension ckþ1 ¼ (ck , ck ) and c0kþ1 ¼ (ck , ck ) are its descendants at the next iteration. In this way, starting with a trivial word (1) of length one leads after k iterations to 2k channelization codewords of length N ¼ 2k (Figure 11.8 shows this for the case k ¼ 3). One can easily see that this algorithm differs from the Sylvester rule of constructing the Hadamard matrix (see Section 2.7.3) only in reordering the resulting matrix rows, so that the codewords obtained are nothing but Walsh functions. Nevertheless they appear in the UMTS specifications under a special name, orthogonal variable spreading factor (OVSF) codes. The uplink OVSF tree is built using k ¼ 8 iterations, so that codewords have maximal length N ¼ 256 chips. The word of this length consisting of all ones is allocated to the dedicated control channel DPCCH, whereby a subsequent scrambling secures DPCCH spreading factor 256, mentioned in Section 11.4.3. Choice of channelization code of the same length for DPDCH (spreading factor 256) allows transmitting data at the rate 15 kbps. If a greater rate is on demand, the data symbol becomes shorter, i.e. the spreading factor drops (the chip rate never changes, remaining 3.84 Mcps!). Appropriate DPDCH channelization words are then taken from the intermediate (kth, SF ¼ 2k being

362

Spread Spectrum and CDMA

(1, 1, 1, 1, 1, 1, 1, 1) (1, 1, 1, 1) (1, 1, 1, 1, –1, –1, –1, –1) (1, 1) (1, 1, –1, –1, 1, 1, –1, –1) (1, 1, –1, –1) (1, 1, –1, –1, –1, –1, 1, 1) (1) (1, –1, 1, –1, 1, –1, 1, –1) (1, –1, 1, –1) (1, –1, 1, –1, –1, 1, –1, 1) (1, –1) (1, –1, –1, 1, 1, –1, –1, 1) (1, –1, –1, 1) (1, –1, –1, 1, –1, 1, 1, –1)

Figure 11.8

Tree of OVSF codes of length 8

the required spreading factor) iteration of the OVSF code tree. If a necessary rate is attainable within a single DPDCH its channelization word number is fixed by the specification as SF/4 ¼ 2k 2 , counting top-down on the tree and numbering the uppermost word by zero. Such a choice always preserves orthogonality between DPDCH and DPCCH independently of DPDCH spreading factor. When a single DPDCH (with spreading factor 4) cannot provide the necessary data rate, the multicode transmission mode involves several DPDCH, all having always the same minimum spreading factor 4. There are three codewords of length 4 orthogonal to each other and to the word of DPCCH, so, allowing for the chance of using the same word for two DPDCH in quadrature multiplexing (Figure 11.7), up to 6 multicode DPDCH may be arranged. The technique of allocation of codewords to PRACH and PCPCH set up by the specification also provides their orthogonality to the dedicated channels over the whole range of DPDCH data rates.

11.4.6 Uplink scrambling The final step in forming the MS signal is its DS spreading by a user-specific signature to realize asynchronous CDMA separation of signals of different MSs in the BS receiver. According to the UMTS thesaurus, this operation, as well as a similar operation in the downlink, is called scrambling. This usage of the term is slightly different to that in the cdmaOne and cdma2000 documents (see Sections 11.3.3.3 and 11.3.3.4). There are two types of uplink scrambling codes predetermined by the standard: either long or short codes apply to scramble dedicated channels. The Gold sequences (see Section 7.5.2) of length L ¼ 225 1 truncated to one frame period, i.e. 38 400 chips, serve to build up the long scrambling codes. The LFSR generators with feedback polynomials f1 (x) ¼ x25 þ x3 þ 1 and f2 (x) ¼ x25 þ x3 þ x2 þ x þ 1 form two m-sequences, of which the second may also be obtained by decimation of the first with the index relevant for Gold codes. The modulo 2 addition of

Operational wireless spread spectrum systems

363

the offset second m-sequence to the first gives a Gold sequence which is then truncated and mapped to the f1g alphabet. The ‘pure’ truncated Gold sequence fci g determines the real component of the MS QPSK signature. To obtain the imaginary part the original (before truncation) Gold sequence is first offset by 16 777 232 chips and then truncated and mapped to produce the f1g sequence fc0i g. After this, the negative of every even element of the latter sequence replaces the following odd element and the result is chip-wise multiplied with fci g. The last operation halves the number of elements in the resulting QPSK sequence whose polarities are opposite to the preceding. Indeed, the equation describing a QPSK signature ai thus obtained is: ai ¼ cðiÞ þ jð 1Þi cðiÞc0 ð2bi=2cÞ;

ð11:1Þ

where c(i) and c0 (i) are just more convenient designations for the elements ci and c0i . One can observe now that in passing from an even position i ¼ 2l to the next odd i ¼ 2l þ 1 the real and imaginary part cannot change simultaneously, meaning that maximal phase jumps are only 90 , never 180 , so a chip polarity may change into the opposite only during transitions from odd to even chips. Reduced frequency of the opposite transitions is typically desirable for battery lifetime, since power amplifier during them dissipates higher energy. The final step of QPSK scrambling consists in multiplication of the MS multiplexed signal taken from the branches of the scheme of Figure 11.7 with scrambling sequence. This operation, which is performed by an ordinary QPSK modulator, was discussed at length in Section 7.1.2. A scrambling sequence is precisely synchronized to the MS clock beginning in any frame from the same symbol (chip). Note that the key advantage of Gold codes—minimax periodic correlation properties—cannot justify their choice for uplink scrambling, because truncation corrupts correlations drastically. An alternative reasoning is ease of generation of many (no fewer than 225 þ 1) pseudorandom sequences. Short scrambling sequences have length 256 and are planned for employment when a BS receiver is capable of running multiuser algorithms (see Section 10.1). In the case of asynchronous CDMA, the complexity of this type of receiver typically grows with the length of spreading code. The rule of forming short scrambling codes set by the specification includes generating a linear recurrent quaternary sequence of length 255, modulo 4 summation of it with two binary recurrent sequences of lengths 51 and 85, extension of the resulting sequence by one element up to length 256, mapping quaternary symbols onto the QPSK alphabet, and transformation of the obtained complex sequence by rule (11.1).

11.4.7 Mapping downlink transport channels to physical channels Information conveyed by the network to a specific MS at the transport layer is organized as a single dedicated channel, which is then mapped to two downlink physical channels similar to those in the uplink: data (DPDCH) and control (DPCCH) dedicated channels. The list of downlink common transport channels is much wider compared to the uplink. It contains, specifically, the already mentioned broadcast channel BCH transmitting

364

Spread Spectrum and CDMA

parameters of the network or cell used by all MS, the forward access channel (FACH) utilized by the BS to send command data to the MS with known location, and the paging channel (PCH), over which the BS sends commands to the MS with unknown location, etc. At the physical layer the primary common control physical channel (P-CCPCH) transmits BCH data, FACH is mapped to the secondary common control physical channel (S-CCPCH), and transmission of PCH is performed again partly by S-CCPCH and partly by the synchronization channel (SCH). There is also a common pilot channel (CPICH) transmitting data-unmodulated signal to be used by the receiver for estimating the channel parameters. A complete scheme of correspondence between the downlink transport and physical channels set up by the specification may be found in [92,121].

11.4.8 Downlink physical channels format The mechanism of multiplexing the downlink dedicated data and control channels DPDCH and DPCCH is different from that of the uplink: every slot is split into parts and every part is allocated either to DPDCH or to DPCCH. Under this arrangement the BS transmitter operates at times in a discontinuous manner, due to the pauses in the datastream during periods of low voice activity. The discontinuous emission being used in the MS transmitter might cause interference, badly affecting nearby electronic devices (e.g. hearing aid). This phenomenon has been repeatedly reported for GSM handsets. However, as for the BS, its discontinuous radiation cannot be that harmful, since the devices mentioned above are hardly likely to be close enough to the BS antenna. Another distinction of the downlink physical channel format is QPSK (unlike BPSK in uplink) data modulation. First, the demultiplexer (DMUX) splits the bit stream after the first physical sublayer (channel encoding, interleaving etc.) into two streams, bearing even and odd original bits, respectively. Both streams mapped to the f1g alphabet are multiplied by a binary channelization code (CC), giving real and imaginary parts of a complex channelized data signal, as Figure 11.9 shows. The final step is multiplication of this QPSK data signal with the QPSK spreading (scrambling) code and QPSK carrier modulation, performed the same way as in the uplink.

Even bits

×

Re

Data DMUX Im

×

Odd bits CC

Figure 11.9 Data demultiplexing and channelization in UMTS uplink

Operational wireless spread spectrum systems

365

11.4.9 Downlink channelization codes Time multiplexing of data and control channels discussed in the previous subsection means that only one dedicated physical channel (DPCH) is necessary to transmit both these information streams. When a single such channel meets the requirement for the data rate the BS forms it by means of a user-specific channelization code sequence, which, of course, is unique over the cell (or sector) and cannot be utilized to contact any other MS. The scenario of multicode transmission arises when the only physical channel is incapable of transmitting data at the demanded rate. Then the BS involves several parallel physical channels to contact the same MS. These channels always operate with the same spreading factor, but with different channelization codes, which cannot be reused by the same BS in connections with other MSs. There is no need to repeat command messages in all multicode channels, so control information is sent to the MS over only one of them. As such, the downlink and uplink channelization codes are of the same type. The Walsh functions family or OVSF tree of Figure 11.8 is used with spreading factor in the range from 4 to 512. Some channelization sequences are not available for DPCH, being allocated to common channels, like CPICH. For example, under the minimal spreading factor only three code sequences may serve DPCH, providing maximal gross data rate 2.88 Mbps. Assuming channel code rate 1/2 and unavoidable overhead (control commands etc.), this gross rate does not comply with 3G demands on the ‘pure’ data rate (up to 2 Mbps), which is one of the reasons why the specification stipulates high-speed uncoded transmission, too. When many users are operating at different rates their channelization codes should preserve orthogonality despite the difference in values of the spreading factors, or, which is the same, in code lengths. As one may conclude on inspecting Figure 11.8, two Walsh functions of different lengths are orthogonal over the minimal length interval if and only if neither of them is a descendant of the other. It follows, then, that—unlike the uplink, where every MS, being isolated from the others by its unique scrambling law, has the whole set of channelization codes at its exclusive disposal—the management of the downlink channelization is much more complicated. Indeed, different MSs should be assigned different subsets of Walsh sequences, containing no descendants of sequences currently serving other MSs. This problem of dynamic resource coordination is being solved at the upper layers of the network protocol stack.

11.4.10 Downlink scrambling codes As was mentioned earlier, downlink scrambling codes secure separation of signals of different BSs. Each scrambling sequence has in its basis a Gold sequence of length L ¼ 218 1 ¼ 262 143. Two LFSR with the feedback polynomials f1 (x) ¼ x18 þ x7 þ 1 and f2 (x) ¼ x18 þ x10 þ x7 þ x5 þ 1 generate initial m-sequences related to each other as required to produce a Gold ensemble (see Section 7.5.2). Although there are 218 þ 1 ¼ 262 145 Gold sequences of the length above, the specification limits the number of those utilized to 213 ¼ 8192. Two segments of length 38 400 are cut from every allowed sequence: the initial one and the one offset by 217 ¼ 131 072 chips, converted then to the f1g alphabet in the usual fashion (6.15). The resulting binary sequences are, respectively, the real and imaginary parts of a downlink QPSK scrambling code.

366

Spread Spectrum and CDMA

The specification establishes a strict hierarchy of the scrambling sequences. The set of all scrambling codes is divided into 512 subsets, each consisting of 1 primary and 15 secondary codes. All 512 primary codes are in turn divided into 64 groups, 8 code sequences in each one. Only one unique primary code is allocated to a specific BS. Some physical channels are allowed to use only the primary code, while others may use either primary or secondary codes.

11.4.11 Synchronization channel 11.4.11.1 General structure The synchronization channel (SCH) possesses quite an important role in the network structure, providing initial cell search and aligning the MS clock diagram with the boundaries of frames and the slots of the received BS signal. Neither channelization nor scrambling codes participate in forming the synchronization channel, since its signal should be found and processed before the MS is aware of the scrambling code of a contacted BS. Note again that BS clocks over the UMTS network are not synchronized to each other, and the initial cell search has to be fulfilled wherever an MS switches to another BS (e.g. in the course of handover). This proved to be one of the key factors in designing the SCH architecture to fit a two-stage search procedure, which is potentially capable of saving acquisition time in comparison with an ordinary serial search (see Sections 8.2 and 8.3). As a matter of fact, the SCH is a pair of primary and secondary synchronization channels, whose signals—primary and secondary synchronization codes—are exploited at the first and second search stages, respectively. Both signals occupy 256 initial chips of every slot. The primary synchronization code sequence is identical not only over all slots but also over all BSs of the network. This makes it impossible for an MS to capture the primary synchronization signal of a predetermined BS; to which of them the MS got connected after the first search stage will become clear only as a result of the second stage. After finding the primary synchronization signal, the MS knows the boundaries of slots but not of frames. At the second stage the MS should remove this ambiguity by testing all 15 (number of slots within a frame) possible values of mismatch between the MS clock and the received BS signal for all possible versions of the secondary synchronization code. To match this task the secondary synchronization code has one frame (15 slots or 38 400 chips) period and a code structure, which is specific for a given BS. Besides, the secondary code sequence is strictly bound to the scrambling code group (one of 64) assigned to the base station. Thus, having completed the second search stage, the MS recognizes the scrambling code group of the captured BS signal, and finally, after testing eight possible primary scrambling code sequences, finds out which of them is used by the contacted BS.

11.4.11.2 Primary synchronization code The primary synchronization code (PSC) is defined in the specification as a 16-element sequence a ¼ (1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1), which is repeated 16 times with or without polarity change to produce the 256-element binary sequence:

Operational wireless spread spectrum systems

367

cps ¼ ða; a; a; a; a; a; a; a; a; a; a; a; a; a; a; aÞ Every BS directly transmits the same sequence cps implementing PSC and enabling the MS to perform the first stage of cell search. Since PSC is meant for time measurement in the multipath environment, it should have relevant autocorrelation properties (see Section 6.1). Despite PSC periodicity, most of its period is empty, so aperiodic ACF sidelobe level is an adequate criterion of PSC quality. As pointed out in Example 6.10.2 (see also Figure 6.16), aperiodic ACF of the UMTS PSC is far from prominent, which is probably a penalty for the hardware simplifications pursued by designers. 11.4.11.3 Secondary synchronization code The secondary synchronization codes (SSC) are built on the basis of a 16-element sequence b replicating the sequence a above in the first eight elements and the negative of a (i.e. a) in the rest: b ¼ (1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1, 1). This sequence is repeated 16 times with or without polarity change to produce the 256element sequence: z ¼ ðb; b; b; b; b; b; b; b; b; b; b; b; b; b; b; bÞ The sequence z is then symbol-wise multiplied with every 16th row of a Sylvester-type Hadamard matrix (see Section 2.7.3) of size 256 to generate 16 orthogonal 256-ary alphabet symbols used further to generate codewords of SSC. The SSC encoding algorithm should secure low levels of all incorrect correlations, i.e. between all 15 cyclic replicas of any one word as well as between any time-shifts of different words. In the UMTS specification all 64 SSC codewords are presented as a table, but an immediate check indicates that these words are just taken from (15,3) 256-ary Reed–Solomon code. The minimum Hamming distance of any Reed–Solomon code is greater by one than the number of check symbols [31,33], i.e. in our case equals 13. This guarantees that there are no more than 2 coinciding 256-ary symbols in any SSC word and any of its 14 cyclic replicas shifted to each other by an integer number of slots. In other words, the normalized periodic ACF of any SSC codeword at such shifts has a level no higher than 2/15. The same is true for any two codewords assigned to different BSs, when only shifts by an integer number of slots are analysed. At the same time, since the BSs of the network do not rely on a common clock, synchronization codes transmitted by them slide against each other and low cross-correlation values should be preserved under arbitrary timeshifts, not only those equal to an integer number of slots. The Reed–Solomon code distance optimality cannot secure a low level of correlations under arbitrary shifts of SSC sequences, and this issue calls for further investigation. As a common conclusion to Sections 11.3 and 11.4, we again stress that our sketchy excursion into 3G systems and standards dealt only with those solutions relevant to the context of this book, i.e. concerning practical implementation of spread spectrum and CDMA ideas. A lot of books and papers already exist, and many more are anticipated, explaining and clarifying various aspects of 3G and beyond, and covering all the layers of the system protocol stack. In particular, we refer the curious reader to [19,69,92,104,114,115,120–122] and to the 3G specifications directly.

References [1] Carlson, A. B. Communication Systems, McGraw-Hill, New York, 1986. [2] Sklar, B. Digital Communications, Prentice-Hall, Upper Saddle River, NJ, 2001. [3] Dixon, R. C. Spread Spectrum Systems with Commercial Applications, John Wiley & Sons, Chichester, 1994. [4] Haykin, S. Communication Systems, John Wiley & Sons, Chichester, 2001. [5] Ziemer, R. E. and Peterson, R. L. Introduction to Digital Communication, Prentice-Hall, Upper Saddle River, NJ, 2001. [6] Ziemer, R. E., Peterson, R. L. and Borth, D. E. Introduction to Spread Spectrum Communications, Prentice-Hall, Englewood Cliffs, NJ, 1995. [7] Proakis, J. G. Digital Communications, McGraw-Hill, New York, 2001. [8] Proakis, J. and Salehi, M. Communication Systems Engineering, Prentice-Hall, Upper Saddle River, NJ, 2002. [9] Simon M. K., Omura, J. K., Scholtz, R. A. and Levitt, B. K. Spread Spectrum Communication Handbook, McGraw-Hill, New York, 1994. [10] Scholtz, R. A. The origins of spread spectrum communications, IEEE Trans. Commun., 30, 822–854, 1982. [11] Conway, J. H. and Sloane, N. J. A. Sphere Packings, Lattices and Groups, Springer-Verlag, New York, 1998. [12] Sloane, N. J. A. Spherical codes, nice arrangements of points on a sphere in various dimensions, http:// www.research.att.com/njas/packings/index.html. [13] Adams, R. A. Calculus: A Complete Course, 4th edn, Addison-Wesley Longman, Don mills, Ontario, 1999. [14] Leon-Garcia, A. Probability and Random Processes for Electrical Engineering, Addison-Wesley, Reading, MA, 1994. [15] Freeman, R. L. Radio System Design for Telecommunications, John Wiley & Sons, Chichester, 1997. [16] Berg, O., Berg, T., Haavik, S., Hjelmstad, J. and Skaug, R. Spread Spectrum in Mobile Communication, IEE, London, 1998. [17] Lee, W. C. Y. Mobile Communications Engineering, McGraw-Hill, New York, 1997. [18] Lee, J. S. and Miller, L. E. CDMA Systems Engineering Handbook, Artech House, Boston, MA, 1998. [19] Glisic, S. Adaptive WCDMA: Theory and Practice, John Wiley & Sons, Chichester, 2003. [20] Kim, K. I. CDMA cellular engineering issues, IEEE Trans. Veh. Tech., 42, 345–350, 1993. [21] Gradstein, I. and Ryzhik, I. Table of Integrals, Series, and Products, Academic Press, New York, 1980. [22] Eliahou, S. and Kervaire, M. Barker sequences and difference sets, L’Enseignement Mathe´matique, 38, 345–382, 1992. [23] Friese, M. Polyphase Barker sequences up to length 36, IEEE Trans. Inform. Theory, 42, 1248–1250, 1996. [24] Brenner, A. F. Polyphase Barker sequences up to length 45 with small alphabets, Electron. Lett., 34, 1576–1577, 1998.

Spread Spectrum and CDMA: Principles and Applications Ó 2005 John Wiley & Sons, Ltd

Valery P. Ipatov

370

References

[25] Lindner, J. Binary sequences up to lengths 40 with best possible autocorrelation function, Electron. Lett., 11, 507, 1975. [26] Cohen, M. N., Fox, M. R. and Baden, J. M. Minimum peak sidelobe pulse compression codes, in Proceedings of the IEEE International Radar Conference, 7–10 May 1990, Arlington, VA, pp. 633–639, IEEE, 1990. [27] Deng, X. and Fan, P. New binary sequences with good aperiodic autocorrelation obtained by evolutionary algorithm, IEEE Commun. Lett., 3, 288–290, 1999. [28] Baumert, L. D. Cyclic Difference Sets, Springer-Verlag, Berlin, 1971. [29] Schmidt, B. Cyclotomic integers and finite geometry, J. Am. Math. Soc., 12, 929–952, 1999. [30] Gilbert, W. J. and Nicholson, W. K. Modern Algebra with Applications, John Wiley & Sons, Chichester, 2004. [31] Bossert, M. Channel Coding for Telecommunications, John Wiley & Sons, Chichester, 1999. [32] Lidl, R. and Niederreiter, H. Introduction to Finite Fields and their Applications, Cambridge University Press, Cambridge, 1994. [33] Blahut, R. E. Algebraic Codes for Data Transmission, Cambridge University Press, Cambridge, 2003. [34] Sverdlick, M. B. Optimal Discrete Signals, Sov. Radio, Moscow, 1975 (in Russian). [35] Lu¨ke, H. D., Schotten, H. D. and Hadinejad-Mahram, H. Binary and quadriphase sequences with optimal autocorrelation properties: a survey, IEEE Trans. Inform. Theory, 49, 3271–3282, 2003. [36] Lu¨ke, H. D. Korrelationsignale, Springer-Verlag, Berlin, 1992 (in German). [37] Fan, P. and Darnell, M. Sequence Design for Communication Applications, John Wiley & Sons, Chichester, 1996. [38] Amiantov, I. N. Selected Issues of Statistical Communications Theory, Sov. Radio, Moscow, 1971 (in Russian). [39] Levanon, N. and Mozeson, E. Radar Signals, John Wiley & Sons, Chichester, 2004. [40] Ipatov, V. P. Ternary sequences with ideal periodic autocorrelation properties, Radio Eng. Elect. Physics, 24(10), 75–79, 1979. [41] Ipatov, V. P. Contributory to the theory of ternary sequences with perfect periodic autocorrelation properties, Radio Eng. Elect. Physics, 25(4), 31–34, 1980. [42] Zierler, N. Linear recurring sequences, J. Soc. Appl. Math., 7, 31–48, 1959. [43] Hoholdt, T. and Justesen, J. Ternary sequences with perfect periodic autocorrelation, IEEE Trans. Inform. Theory, 29, 597–600, 1983. [44] Ackroyd, M. H. and Ghani, F. Optimal mismatched filter for sidelobe suppression, IEEE Trans. Aerosp. Electron. Syst., 9, 214–218, 1973. [45] Rihaczek, A. W. and Golden, R. M. Range sidelobe suppression for Barker codes, IEEE Trans. Aerosp. Electron. Syst., 7, 1087–1092, 1971. [46] Ipatov, V. P. Total suppression of sidelobes of periodic correlation functions of phase manipulated signals, Radio Eng. Elect. Physics, 22(8), 42–47, 1977. [47] Ipatov, V. P. Choice of periodical PSK signal and filter combination, Radioelectron. a. Commun. Syst. (Radioelektronika), 21(4), 49–55, 1978. [48] Ipatov, V. P. Synthesis of a binary periodic signal-filter pair, Radioelectron. a. Commun. Syst. (Radioelektronika), 23(4), 46–51, 1980. [49] Ipatov, V. P. Binary periodic sequences with low sidelobe suppression loss, Radioelectron. a. Commun. Syst. (Radioelektronika), 23(1), 15–19, 1980. [50] Ipatov, V. P. and Fedorov, B. V. Regular binary sequences with small losses in suppressing sidelobes, Radioelectron. a. Commun. Syst. (Radioelektronika), 27(3), 29–33, 1984. [51] Blokhuis, A. and Tiersma, H. J. Bounds for the size of radar arrays, IEEE Trans. Inform. Theory, 34, 164–167, 1988. [52] Hamkins, J. and Zeger, K. Improved bounds on maximum size binary radar array, IEEE Trans. Inform. Theory, 43, 997–1000, 1997. [53] Golomb, S. W. and Taylor, H. Two-dimensional synchronization patterns for minimum ambiguity, IEEE Trans. Inform. Theory, 28, 600–604, 1982. [54] Golomb, S. W. and Taylor, H. Construction and properties of Costas arrays, Proc. IEEE, 72, 1143–1163, 1984. [55] Chatschik, B. An overview of Bluetooth wireless technology, IEEE Commun. Magazine, 39, 86–94, 2001. [56] Ross, J. A. F. and Taylor, D. P. Vector assignment scheme for N þ M users in N-dimensional global additive channel, Electron. Lett., 28, 1634–1636, 1992.

References

371

[57] Paavola, J. and Ipatov, V. P. Binary CDMA signatures for N þ M users in N-dimensional global signal space, Electron. Lett., 39, 738–740, 2003. [58] Djonin, D. and Bhargava V. New results on low complexity detectors for oversaturated CDMA systems, in Proceedings of GLOBECOM, 25–29 November 2001, San Antonio, TX, vol. 2, pp. 846–850, IEEE, 2001. [59] Paavola, J. and Ipatov, V. P. Oversaturating synchronous CDMA systems on the signature per user basis, in Proceedings of the 5th European Personal Mobile Communications Conference, 22–25 April 2003, Glasgow, UK, pp. 427–430, IEEE, 2003. [60] Learned, R. E., Willsky, A. S. and Boroson, D. M. Low complexity optimal joint detection for oversaturated multiple access communications, IEEE Trans. Signal Processing, 45, 113–123, 1997. [61] Shi, Z. and Schlegel, C. Spreading code construction for CDMA, IEEE Commun. Lett., 7, 4–6, 2003. [62] Welch, L. R. Lower bound on the maximum cross-correlation of signals, IEEE Trans. Inform. Theory, 20, 397–399, 1974. [63] Rupf, M. and Massey, J. L. Optimum sequence multisets for synchronous code-division multiple-access channels, IEEE Trans. Inform. Theory, 40, 1261–1266, 1994. [64] Karystinos, G. N. and Pados, D. A. New bounds on the total squared correlation and optimum design of DS-CDMA binary signature sets, IEEE Trans. Commun., 51, 48–51, 2003. [65] Ipatov, V. P. On the Karystinos–Pados bounds and optimal binary DS-CDMA signature ensembles, IEEE Commun. Lett., 8, 81–83, 2004. [66] Stark, H. and Woods, J. W. Probability and Random Processes with Applications to Signal Processing, Prentice-Hall, Upper Saddle River, NJ, 2002. [67] Sarwate, D. V. and Pursley, M. B. Crosscorrelation properties of pseudorandom and related sequences, Proc. IEEE, 68, 593–619, 1980. [68] Sidelnikov, V. M. On the mutual correlation of sequences, Soviet Math. Dokl., 12, 197–201, 1971. [69] Korowajczuk L., Xavier, B. S. A., Filho, A. M. F., Ribeiro, L. Z., Korowajczuk, C. and DaSilva, L. A. Designing cdma2000 Systems, John Wiley & Sons, Chichester, 2004. [70] Ipatov, V. P. Periodic Discrete Signals with Optimal Correlation Properties, Radio I Sviaz, Moscow, 1992 (in Russian). [71] Goldberg, B.-G. Code division multiplexing by frequency shifted biphase modulated M-sequences, IEEE Trans. Aerosp. Electron. Syst., 17, 303–304, 1981. [72] Gold, R. Optimal binary sequences for spread spectrum multiplexing, IEEE Trans. Inform. Theory, 13, 619–621, 1967. [73] Kasami, T. Weight distribution formula for some class of cyclic codes, Technical Report R-285, Coordinated Science Laboratory, University of Illinois, Urbana, April 1966. [74] Kamaletdinov, B. Zh. An optimal ensemble of binary sequences based on the union of the ensembles of Kasami and bent-function sequences, Problems of Inform. Transmission, 24, 167–169, 1988. [75] Olzen, J. D., Scholtz, R. A. and Welch, L. R. Bent-function sequences, IEEE Trans. Inform. Theory, 28, 858–864, 1982. [76] Kamaletdinov, B. Zh. Optimal sets of binary sequences, Problems of Inform. Transmission, 32, 171–175, 1996. [77] Glisic, S. and Vucetic, B. Spread Spectrum CDMA Systems for Wireless Communications, Artech House, Boston, MA, 1997. [78] Ipatov V. P., Kazarinov, Yu. M. (ed.), Kolomensky, Yu. A. and Uljanitsky, Yu. D. Acquisition, Detection and Parameter Measuring of Signals in Radionavigation Systems, Sov. Radio, Moscow, 1975 (in Russian). [79] Holmes, J. K. and Chen, C. C. Acquisition time performance of PN spread spectrum systems, IEEE Trans. Commun., 25, 778–784, 1977. [80] Polydoros, A. and Weber, C. L. A unified approach to serial search spread-spectrum code acquisition— Part I: General theory, IEEE Trans. Commun., 32, 542–549, 1984. [81] Polydoros, A. and Weber, C. L. A unified approach to serial search spread-spectrum code acquisition— Part II: A matched filter receiver, IEEE Trans. Commun., 32, 550–560, 1984. [82] Di Carlo, D. M. and Weber, C. L. Multiple dwell serial search: performance and application in direct sequence code acquisition, IEEE Trans. Commun., 31, 650–659, 1983. [83] Viterbi, A. J. CDMA: Principles of Spread Spectrum Communication, Addison-Wesley, Reading, MA, 1995. [84] Zigangirov, K. Sh. Theory of Code Division Multiple Access Communication, John Wiley & Sons, Chichester, 2004.

372

References

[85] Wald, A. Sequential Analysis, John Wiley & Sons, New York, 1947. [86] Stiffler, J. J. Theory of Synchronous Communications, Prentice-Hall, Englewood Cliffs, NJ, 1971. [87] Golomb, S. W. (ed.) Digital Communications with Space Applications, Prentice-Hall, Englewood Cliffs, NJ, 1964. [88] Van Trees, H. L. Detection, Estimation and Modulation Theory, Part II, Nonlinear Modulation Theory, John Wiley & Sons, Chichester, 2002. [89] Lindsey, W. C. Synchronization Systems in Communication and Control, Prentice-Hall, Englewood Cliffs, NJ, 1972. [90] Viterbi, A. J. Principles of Coherent Communications, McGraw-Hill, New York, 1966. [91] Clark G. C. and Cain, J. B. Error-Correcting Coding for Digital Communications, Plenum Press, New York, 1988. [92] Castro, J. P. The UMTS Network and Radio Access Technology. An Interface Techniques for Future Mobile Systems, John Wiley & Sons, Chichester, 2001. [93] Viterbi, A. J. and Omura, J. K. Principles of Digital Communications and Coding, McGraw-Hill, New York, 1979. [94] Heller, J. A. and Jacobs, I. W. Viterbi decoding for satellite and space communications, IEEE Trans. Commun. Technol., 19, 835–848, 1971. [95] Berrou, C., Glavieux, A. and Thitimajshima, P. Near Shannon limit error-correcting coding and decoding: turbo codes, in Proceedings of the IEEE International Conference on Communications, ICC ’93, 23–26 May 1993 Geneva, Switzerland, vol. 2, pp. 1064–1070, IEEE, 1993. [96] Berrou, C. and Glavieux, A. Near optimum error correcting coding and decoding: turbo codes, IEEE Trans. Commun., 44, 1261–1271, 1996. [97] Schlegel, C. B. and Pe´rez, L. C. Trellis and Turbo Coding, John Wiley & Sons, Chichester, 2004. [98] Bahl, L. R., Cocke, J., Jelinek, F. and Raviv, J. Optimal decoding of linear codes for minimizing symbol error rate, IEEE Trans. Inform. Theory, 20, 284–287, 1974. [99] Madhow, U. and Honig, M. L. MMSE interference suppression for direct-sequence spread spectrum CDMA, IEEE Trans. Commun., 42, 3178–3188, 1994. [100] Wang, X. and Poor, V. H. Wireless Communication Systems. Advanced Techniques for Signal Reception, Prentice-Hall, Upper Saddle River, NJ, 2004. [101] Honig, M. and Tatsanis, M. K. Adaptive techniques for multiuser CDMA receivers, IEEE Signal Process. Magazine, 17, 49–61, 2000. [102] Verdu´, S. Multiuser Detection, Cambridge University Press, Cambridge, 1998. [103] Lu, W. W. (ed.) Broadband Wireless Mobile. 3G and Beyond, John Wiley & Sons, Chichester, 2002. [104] Tanner, R. and Woodward, J. WCDMA—Requirements and Practical Design, John Wiley & Sons, Chichester, 2004. [105] Fazel, K. and Kaiser, S. Multi-Carrier and Spread Spectrum Systems, John Wiley & Sons, Chichester, 2003. [106] Hara, S. and Prasad, R. Overview of multicarrier CDMA, IEEE Commun. Magazine, 35, 126–133, 1997. [107] Popovic´, B. M. Spreading sequences for multicarrier CDMA systems, IEEE Trans. Commun., 47, 918–926, 1999. [108] Telatar, E. Capacity of multi-antenna Gaussian channels, Eur. Trans. Telecommun., 10, 585–595, 1999. [109] Foschini, G. J. and Gans, M. J. On limits of wireless communications in a fading environment when using multiple antennas, Wireless Personal Commun., 6, 311–335, 1998. [110] Vucetic, B. and Yuan, J. Space–Time Coding, John Wiley & Sons, Chichester, 2003. [111] Alamouti, S. M. A simple transmit diversity technique for wireless communications, IEEE J. Select. Areas. Commun., 16, 1451–1458, 1998. [112] Tarokh, V., Jafarkhani, H. and Calderbank, A. R. Space–time block codes from orthogonal designs, IEEE Trans. Inform. Theory, 45, 1456–1467, 1999. [113] Tarokh, V., Naguib, A., Seshardi, N. and Calderbank, A. R. Space–time codes for high data rate wireless communication: performance criteria in the presence of channel estimation errors, mobility, and multiple paths, IEEE Trans. Commun., 47, 199–207, 1996. [114] Holma, A. and Toskala, A. (eds) WCDMA for UMTS. Radio Access for Third Generation Mobile Communications, John Wiley & Sons, Chichester, 2001. [115] Korhonen, J. Introduction to 3G Mobile Communications, Artech House, Boston, MA, 2001. [116] Hockwald, B., Marzetta, T. L. and Papadias, C. B. A transmitter diversity scheme for wideband CDMA systems based on space-time spreading, IEEE J. Select. Areas. Commun., 19, 48–60, 2001.

References

373

[117] Hoffman-Wellenhoff, B., Lichtenegger, H. and Collins, J. Global Positioning System: Theory and Practice, Springer-Verlag, New York, 2001. [118] El-Rabbani, A. Introduction to GPS: The Global Positioning System, Artech House, Boston, MA, 2002. [119] Farrel, J. and Barth, M. The Global Positioning System and Inertial Navigation, McGraw-Hill, New York, 1999. [120] Steele, R., Lee, Ch. and Gould, P. GSM, cdmaOne and 3G Systems, John Wiley & Sons, Chichester, 2001. [121] Karim, M. R. and Sarraf, R. W-CDMA and cdma2000 for 3G Mobile Networks, McGraw-Hill, New York, 2002. [122] Walke, B., Seidenberg, P. and Althoff, M. P. UMTS: The Fundamentals, John Wiley & Sons, Chichester, 2003.

Index

abnormal error, 150 ACF, see also Autocorrelation function mainlobe, 150, 157, 168, 233, 235, 239, 262 of code sequence, 138, 154, see also Code ACF aperiodic, 139, 154, 158, 174, 176 periodic, 140, 158, 174, 186, 231, 236 perfect periodic, 159, 176, 185, 233 sidelobe, 150, 152, 155, 161, 168, 174, 177, 185, 192, 228, 234, 264, 271, 309 acquisition, 252, see also Search almanac, 342 ambiguity diagram, 57 function, 56, 60, 153 amplitude estimation, see Estimation of amplitude amplitude modulation law, see Real envelope amplitude-phase shift keying, see APSK amplitude shift keying, see ASK analytic signal, 25 antenna directional, 90 diversity, see Space diversity omnidirectional, 90 power gain, 90

Spread Spectrum and CDMA: Principles and Applications Ó 2005 John Wiley & Sons, Ltd

antipodal pair, 16 APSK, 137, 145, 154, 203, 215 ASK, 16, 19, 78, 207 autocorrelation function of noise, 14 of bandpass signal, 44 of signal, 43, 48, 52, 57, 102, 137, 149 sharpness, 49 average acquisition time, 259 average energy, 18 average squared correlation, 226 AWGN channel, see Gaussian channel band-elimination filter, 79 bandpass signal, 11, 19, 24, 45, 58, 117, 136, 145, 150 bandwidth, 1, 9, 30, 50, 62, 78, 88, 117, 128, 136, 145, 150, 205, 214, 271, 317, 330 Barker code, 155 binary, 156 polyphase, 157 base station, see BS baseband signal, 11, 18, 22, 45, 54, 104, 156 bent-sequence ensemble, 241 binary character, 171, 181 properties, 171

Valery P. Ipatov

376

binary code, 12, 155, 161, 175, 186, 281, 301 binary data transmission, 11 binary phase shift keying, see BPSK binary sequence, 141, 155, 160, 163, 168, 176, 181, 205, 243 minimax, 159, 168, 189, 233, 268 non-antipodal, 178 bit pattern, 116, 216, 308, 315 bit stream, 29, 205, 212, 278, 288, 297, 318 BPSK, 16, 29, 34, 78, 97, 117, 124, 137, 181, 204, 216, 291, 300, 308, 323, 342, 364 branch metric, 293 broadcasting channel, 360, 363 BS, 124, 232, 268, 334, 345, 358, 367 capacity, 225, 277, 300, 327 carrier frequency, 4, 16, 19, 25, 53, 58, 82, 124, 151, 211, 236, 269 CCF, 121, 139 of code sequences, 139, 231, 233, 237, 243 CDMA, 121, 204, 235 asynchronous, 121, 227, 278, 342, 354, 361 synchronous, 121, 215, 218 cdmaOne, 124, 212, 262, 278, 286, 290, 296, 318, 345, see also IS-95 cdma2000, 105, 121, 212, 234, 278, 286, 296, 301, 318, 334, 356, 363 cellular systems, 124 central limit theorem, 8, 123 channel coding, 277 channelization code, 364, 365 channel(s) access, 355 common, 359 dedicated, 359 physical, 359 logical, 358 paging, 348 physical, 358 pilot, 347 synchronization, 347 traffic, 349, 353 transport, 358

Index

chip, 34, 88, 136, 154, 181, 205, 227, 252, 262, 271, 308, 316, 323, 343, 351, 358 complex amplitude, 136 chi-square law, 85 Chu code, 179 ciphertext, 88 clock interval, 164 cluster, 125 code block, 278 convolutional, 278, 286, 348, 355, 358 free distance of, 291 systematic, 289, 297 rate of, 287 detection capability, 279 distance, 280, 290, 367 error-detecting, 281 Hamming, 285, 342, 344 linear, 281 Reed-Solomon, 367 systematic, 283 tree, 278, 286 turbo, 296, 357 code ACF, 138, 154, 160 aperiodic, 139, 155, 174 periodic, 140, 158, 174 code division multiple access, see CDMA code phase, 254 code polynomial, 281 code sequence, 34, 136, 145, 154, 160, 215, 224, 264, 310 code tracking, 252, 265 codestream, 278, 350 codeword, 278 coding gain, 29 asymptotic, 29 of convolutional code, 291 of orthogonal coding, 29 coherence bandwidth, 101, 319, 324 coherence time, 102 combining, 98, 105 equal weight, 99 maximal ratio, 99, 105, 325 selection of a maximum SNR branch, 99 common packet channel, see CPCH

Index

complementary error function, 13, 18, 97, 328 complex envelope, 24, 44, 48, 53, 55, 92, 104, 136, 151, 208, 215, 224, 269, 320, 324, 329, 333 of ACF, 44 constant component, 85, 160, 178, 190, 231, 238 constraint length, 287, 296, 301, 348, 358 continuous wave, see CW conventional receiver, 117, 122, 223, 307, 312, 315 convolution, 186, 288 integral, 23, 45, 47, 270 correlation, 10, 15, 34, 39, 46, 116, 193, 204, 223, 227, 231, 253, 263, 269, 308, 316 coefficient, 13, 27, 41, 62, 216, 224, 308 decision rule, 10, 39, 55 modulus, 27, 46, 53, 259 peak, 232, 235, 238, 240, 243 spread, 50, 57, 60, 85, 102, 150, 187 correlator(s), 15, 44, 47, 53, 83, 105, 205, 228, 253, 267, 309, 324 bank of, 47, 55, 252, 266, 354 cosine theorem, 14, 21, 26, 92, 127 Costas array, 194 CPCH, 360, 364 Cramer-Rao bound, 40, 49, 54 CRC, 285, 286, 348, 358 cross correlation function, see CCF crossover probability, 279, 292 CW, 24, 54, 81, 159, 204, 208 cyclic convolution, 186, 321 cyclic redundancy code, see CRC datastream, 204, 214, 252, 317, 323, 352, 359, 364 DBPSK, see Differential BPSK decimation, 194, 236, 242, 349, 362 index, 194, 236, 239, 362 decoding hard, 279, 302, soft, 278, 292, 295 decorrelating algorithm, 309, 316

377

dedicated physical control channel, see DPCCH data channel, see DPDCH delay spread, 92, 98, 101, 214, 228, 232, 318 delay-lock loop, see DLL delta function Dirac, 14, 267, 272 Kronecker, 20 demodulator, 43, 205, 208, 214 despreading, 206, 210, 212, 252, 265, 324, 352 detection probability, 86, 121, 255, 263 deterministic signals, 11, 26 DFT, 186, 236, 321, 322 dichotomy, 264 differential BPSK, 63 dimension of signal space, 18, 28, 31, 88, 117, 145, 218 direct sequence spreading, see DS spreading discrete Fourier transform, see DFT discrete spread spectrum signal, 136, 145 aperiodic (pulse), 136, 155, 188 periodic, 136, 142, 159, 168, 185, 268 diversity, 98 antenna (space), 100 branch, 98, 103, 326, 332, 357 frequency, 101 gain, 98, 328, 333 multipath, 98, 102, 352 polarization, 102 receive, 100, 326, 330 time, 102 transmit, 100, 326, 333 division with remainder, 282 divisor, 282 DLL, 266, 270, 352 discriminator, 267 coherent, 269 curve, 268 early-late, 267 noncoherent, 269 Doppler spread, 102 downlink, 116, 121, 124, 177, 214, 315, 327, 333, 345, 358, 363

378

DPCCH, 359, 364 DPDCH, 359, 364 DS CDMA, 214, 227, 307, 310, 318, 333, 358 DS spreading, 205, 207, 214, 318, 342, 348, 352, 358, 362 dwell time, 255, 260, 263 eavesdropper, see Interceptor electromagnetic compatibility, 88, 128 electronic countermeasures, 80 elementary pulse, 34, 136 emanating system, 88 EMC, see Electromagnetic compatibility enemy cryptanalyst, 88 energy detector, see Radiometer energy parameter, 38 ephemeris, 342 equalizer (equalizing), 51, 98, 214, 282, 319, 323 zero-forcing, 185, 322, 325 error burst, 302, 348 error correction, 279, 292, 348, 353 error detection, 279, 284 error function, 30 error probability, 12, 18, 22, 29, 78, 90, 96, 123, 216, 278, 291, 301, 327, 330 of coherent reception of M orthogonal signals, 22 symbol, see Crossover probability error signal, 266, 276 error vector, 284 estimate, 17, 37, 46, 54, 83, 252, 266, 308, 315, 322, 332 efficient, 40 asymptotically, 40 maximal likelihood (ML), 38, 42, 46, 54, 308 unbiased, 40 asymptotically, 40 estimation accuracy (precision), 39, 48, 57 of amplitude, 42 of carrier frequency, 53 of phase, 43 of time delay, 46

Index

simultaneous of time delay and frequency, 55 Euclidean distance, 8, 38, 116, 278 fading, 59, 302, 327, 348 fast, 95, 329 flat, 59, 95, 104, 319, 324 frequency-selective, 59, 98, 102, 319 large scale, 91 long term, see Large scale fading multipath, 90, 98 Rayleigh, 94, 328 short term, see Small-scale fading slow, 95, 329 small-scale, 93 false alarm probability, 85, 255, 263 FDMA, 117, 129, 354 FH spreading, 212 fast, 212 slow, 212 field, 162 finite, 162, 170, 184 extension, 184, 237 prime, 162 operations, 162 filter coefficients, 186 finite impulse response, see FIR filter inverse, 187 response, 45, 60, 102, 149, 160, 191 sidelobe suppression, see SLSF FIR filter, 186, 288, 319 forward link, 345 Fourier transform(s), 1, 23, 50, 54, 122, 152, 186 Frank code, 180 free-space propagation, 90 frequency tracking, 252 frequency deviation, 4, 151 frequency division multiple access, see FDMA frequency hopping spreading, see FH spreading frequency-offset binary m-sequences, 235 frequency resolution, 60, 62 frequency-shift coding, 33

379

Index

frequency shift keying, see FSK frequency spread, 54, 57 Friis formula, 90 FSK, 16, 33, 117, 137, 142, 192, 212 Gabor uncertainty principle, 3 Galois field, see Finite field Gaussian channel, 2, 8, 301, 328 noise, 8, 150, 259, 278, 331 process, 13, 85, 95, 273 generator polynomial, 283, 288 Global Positioning System, see GPS GLONASS, 236, 344 GNSS, 345 Gold sequence, 169, 236, 240, 342, 362, 365 GPS, 5, 55, 87, 239, 252, 262, 340, 346 C/A-code, 341 control segment, 341 differential positioning, 343 P-code, 341 selective availability, 344 space segment, 340 user segment, 341 group signal, 115, 214, 220, 307 GSM, 3, 119 Hadamard matrix, 34, 217, 221, 314, 347, 361, 367 Hamming distance, 280, 290, 296, 367 weight, 280, 290 handover, 124, 262, 346, 352, 358, 366 soft, 353, 356 Hilbert transform, 23 imbalance, see Constant component initial phase, 26, 43, 53, 55 random, 26, 48, 53 inner product, 10 integration-reset, 205 intended system, 82 inter-cell MAI, 126 interceptor, 83 interference cancellation, 315 interleaving, 297, 302, 355, 359

intersymbol interference, see ISI inverse element, 162 ISI, 59, 95, 98, 104, 319, 321 IS-95, 6, 64, 105, 121, 124, 169, 212, 234, 262, 345, 357, see also cdmaOne IS-136, 119 Jammer, 77 barrage, 80 narrow band, 78 jamming immunity, 82 Kamaletdinov ensemble, 241 Kasami set, 169, 239, 243 Kronecker power, 221 Kronecker product, 35 Legendre sequence, 172, 176, 178, 234, 268 symbol, 172 length of discrete signal (code), 136, 144, 205, 217, 228, 262, 279, 285 LFM signal, 4, 65, 81, 151, 154 LFSR, 163, 184, 237, 240, 346, 362, 365 linear feedback shift register, see LFSR linear recurrent sequence, 163, 192, 363 memory of, 163 linearly frequency-modulated signal, see LFM signal line of sight, see LOS logarithm (in finite field), 171 long code, 64, 346, 349, 354, 357 LOS, 90, 94 low probability of detection, 82 MAI, 122, 128, 223, 228, 234, 278, 307, 311, 315, 323, 346, 350, 353 MAP, 299 Marcum Q-function, 260 matched code, 265 matched filter(s), 15, 44, 47, 53, 78, 81, 102, 150, 156, 168, 186, 191, 252, 259, 266, 311, 315, 331 bank of, 53 matrix inversion lemma, 313 maximal-length sequence, see m-sequence

380

maximal likelihood estimate, see ML estimate maximal likelihood rule, see ML rule maximum a posteriori probability, see MAP MC modulation, 316 MC-CDMA, 322 MC-DS-CDMA, 318, 357 MIMO, 326 minimax criterion, 154, 232 minimax ensemble, 232, 243, 323 minimax sequence, 161, 169, 175, 265 minimum distance, 18, 22, 28, 46, 215, 222, 290, 301 rule, 9, 11, 38, 42, 116 minimum mean-square error, see MMSE detector mismatched processing (filtering), 52, 152, 185, 311, 325 ML estimator, 48, 55 ML rule, 8, 38, 40, 116, 223, 252, 265, 278, 308, 331 MMSE detector, 311, 313 blind, 315 mobile station, see MS MS, 124, 232, 346, 352, 357, 361, 363, 367 m-sequence, 165, 174, 179, 234, 268 balance property, 165, 182 binary, 167, 179, 205, 234, 236, 239 pair property, 182 p-ary, 165, 181, 242 shift-and-add property, 166 multicarrier modulation, see MC modulation multicode transmission, 356, 359, 365 multipath interference, 98, 229, 234 multipath propagation, 59, 91, 98, 104, 234, 321, 328 multiple access, 116, 121, 129 interference, see MAI orthogonal, 117, 120, 128 multiple-input multiple output, see MIMO multiplicative interference, 89

Index

multiuser detection (receiver), 116, 215, 222, 308, 325 asynchronous, 316 system, 116 near-far problem, 122, 126, 350 negative element, 162, 281 node metric, 293 noise bandwidth, 272 noncoherent reception, 11, 26, 28 non-energy parameter, 39, 41, 46 nuisance parameter, 46, 53 observation, 7, 17, 29, 38, 47, 57, 83, 116, 150, 205, 216, 254, 266, 270, 278, 285, 292, 299, 308, 315, 331 correlation matrix, 312, 317 interval, 41, 83, 116, 307, 317 OFDM, 320, 323 cyclic prefix, 321 symbol, 320, 323 Okumura-Hata model, 90 optimal signal pair, 15 optimality criterion, 40 O-QPSK, 356, 357 orthogonal frequency division multiplexing, see OFDM orthogonal modulation (signalling), 22, 33, 36, 353, 357 orthogonal pair, 16 orthogonal signal sets, 31, 222, 311 orthogonal variable spreading factor codes, see OVSF codes orthonormal vectors, 21, 218, 325 oversaturated CDMA, 218, 226, 308, 314, 333 OVSF codes, 361 packing, 11 spherical, 18 volume, 18 paging channel, 348 PAM, 19 parameter estimation (measuring), 37, 39, 41, 61, 78, 82, 265

381

Index

Parseval theorem, 23, 33, 50, 78, 121 PCG, 351, 355 PDF, 13, 17, 50, 85, 94, 126 Gaussian, 13, 85, 132 lognormal, 91, 94, 109 Rayleigh, 84, 112, 259, 273, 329, 336 Rician, 259, 260 peak-factor, 33, 155, 181, 185, 323, 331, 333 peak power, 33, 51, 60, 79, 103, 119, 150, 156, 181 phase estimation, see estimation of phase phase modulation, 19, 24 phase shift keying, see PSK phasor diagram, 92 pilot signal, 100, 170, 347, 353, 357, 360 plain signal, 3, 52, 57, 81, 103, 135, 206 polynomial irreducible, 166, 184, 286 non-primitive, 184 primitive, 166, 174, 199, 240, 242, 285, 346 polyphase code (sequence), 157, 168, 179, 217, 233, 236, 337 power control, 123, 126, 130, 314, 350, 355, 359, 361 bit, 348, 350, 352 group, see PCG probability density function, see PDF probability of correct acqusistion, 254, 256, 260 processing gain, 81, 86, 89, 123, 145, 150, 152, 205, 227, 270, 317 of discrete signal, 145, 229 propagation difference, 92, 101 PSK, 20, 43, 63, 117, 121, 137, 155, 175, 180, 207, 216, 224, 322, 332 Barker code, 155, see also Polyphase Barker code signature(s), 225, 231 pseudo-range, 340 pull-in, 252, 267 pulse amplitude modulation, see PAM pulse response, 23, 44, 47, 270, 288, 321 puncturing, 288, 302, 350 Pythagorean theorem, 9, 24

QAM, 20, 41, 207, 322, 331, 333 QPSK, 63, 109, 123, 137, 180, 318, 322, 333, 352, 356, 359, 364 offset, see O-QPSK quadrature amplitude modulation, see QAM quadrature components, 19 quadrature phase shift keying, see QPSK quantization error, 47 radar array, 192 radiometer, 83 RAKE, 5, 105, 121, 233, 352 fingers, 105, 352 rapid acquisition sequence, 264 Rayleigh channel, 95, 98, 314 real envelope, 19, 23, 44, 54, 151, 259, 270, 323 of ACF, 44 reference signal, 38, 41, 47, 55, 92, 102, 105, 209, 214, 231, 252, 266, 271, 309, 315, 334, 347, 359 remainder, 282 reverse link, 347, 354, 360 sampling, 9, 53 period (interval), 9, 252, 321 theorem, 18, 300 scalar product, see Inner product scrambling, 170, 239, 349, 354, 362 code, 362, 365 Schwarz’s inequality, 99 search, 252, 262, 342, 358, 366 average number of steps, 254, 258 cycle, 255 multiple dwell, 263 parallel, 263 serial, 253, 262, 264, 366 seria-parallel, 263 step, 255 two-dwell, 262 sequential analysis, 262 shadowing, 99 Shannon’s bound, 2, 277, 301 capacity, 225, 327, 335 theorem, 277

382

short codes, 346 Sidelnikov bound, 232, 238 sidereal period, 341, 344 signal duration, 1, 9, 31, 44, 49, 54, 58, 62, 80, 83, 92, 135, 149 signal(s) coherent, 28 constellation, 18 continuous, 136 discrete, 136, 145, 168, 205, 271, 282 aperiodic, 136, 155, 187 periodic, 136, 138, 142, 159, 168, 185, 268 energy, 9, 10, 15, 27, 38, 42, 51, 78, 83, 89, 100, 117, 135, 155, 181, 271, 292 equidistant, 21, 29 orthogonal, 16, 22, 27, 30, 79, 87, 117, 354 resemblance, 10, 26, 39, 46, 50, 54, 58, 138 resolution, 58, 62, 102, 137, 159, 149 simplex, 21 structure secrecy, 87 vector length, 15 signal-to-interference ratio, see SIR signal-to-noise ratio, see SNR signature(s), 120, 125, 204, 212, 214, 227, 231, 307, 317, 322, 333, 362 correlation matrix, 308 ensemble (set), 203, 217, 220, 229, 234, 312, 324, matrix, 226, 310, 312, 316 orthogonal, 217, 221, 224, 227, 308, 311, 323 pseudorandom, 231 random, 229 Welch-bound, 223, 227, 312 time-offset, 232 Singer code, 190 single-user receiver, see Conventional receiver SINR, 313 SIR, 78, 123, 127, 226, 278 floor, 123, 128, 227 SLSF, 186, 192 energy loss, 188

Index

small Fermat theorem, 171 SNR, 15, 18, 29, 41, 49, 54, 59, 62, 79, 86, 96, 99, 104, 149, 152, 186, 216, 225, 259, 292, 296, 301, 309, 325, 327, 332 in the loop, 272 loss, 188, 190, 311, 325 sonar array, 194 space-time code (coding), 100, 327 Alamouti, 331 repetition, 329 time-switched, 330 spectral efficiency, 2, 30, 319, 333 speed of light, 232, 340 spread spectrum orthogonal coding, 33 signal(s), 3, 7, 32, 36, 51, 57, 62, 81, 86, 87, 104, 120, 135, 145, 217, 251, 264, 266 for time measuring, 150 system, 3, 137, 210, 251, 278, 307, 343 spreading factor, 205, 215, 217, 278, 316, 323, 352, 356, 358, 361, 365 square-law amplitude detector, 83 stationary wave, 92 survivor, 293 susceptible system, 88 Sylvester rule, 35, 361 synchronization, 37, 118, 121, 149, 251, 269, 347, 351 channel, 46, 159, 169, 177, 334, 347, 364, 366 codes, 176, 265, 366 syndrome, 284 system time, 340 tau-dither loop, 270 TDMA, 3, 118, 124, 129, 330 ternary sequence, 163, 167, 181, 185 with perfect periodic ACF, 181, 185 thermal noise, 8, 78, 83, 87, 123, 128, 278, 309, 313 throughput, 340 time compression, 51, 60, 103, 150, 153 time division multiple access, see TDMA time resolution, 58, 62, 102, 149, 154, 177, 191, 193

383

Index

time-frequency product, 3, 31, 51, 60, 80, 120, 145, 205, 317 time-frequency resolution, 60, 62, 153 time-frequency resource, 30, 36, 115, 119, 123, 125, 128, 145, 300 time-shift coding, 31 total squared correlation, see TSC traffic channel, 349, 353 transfer function, 23, 59, 78, 83, 95, 98, 187, 271, 288, 298, 321 transition probability, 8, 292, 299 trellis, 289, 299 diagram, 289, 295, 299 TSC, 224 UMTS, 6, 36, 105, 121, 176, 212, 239, 265, 278, 286, 296, 301, 334, 356 uncertainty region, 252, 265 union bound, 17, 30 uplink, 31, 119, 124

variance, 13, 84, 89, 99, 187, 224, 312, 329, 333 of error, 40, 49, 272 of estimate, 40, 43, 48 VCO, 267 Viterbi algorithm, 286, 292, 352 vocoder, 349, 353 voice activity factor, 127, 353, 355 voltage controlled oscillator, see VCO Walsh functions (sequences), 35, 120, 217, 323, 346, 352, 361, 365 wavelength, 90, 94, 100, 326 weak orthogonality, 217 Welch bound, 224, 228, 234, 236 Welch-bound sequences, 223, 226, 336 Woodward formula, 50, 273 z-transform, 281, 288